top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial intelligence and national security / / Reza Montasari
Artificial intelligence and national security / / Reza Montasari
Autore Montasari Reza
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (229 pages)
Disciplina 355.03
Soggetto topico National security - Decision making
Computer security
ISBN 3-031-06709-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Artificial Intelligence and the Spread of Mis- and Disinformation -- 1 Introduction -- 2 Misinformation Versus Disinformation -- 2.1 Information and the Meaning of Truth in a Post-Truth World -- 2.2 The Differences Between Misinformation and Disinformation -- 3 AI, Bots, and the Spread of Mis- and Disinformation -- 3.1 Definitions of AI and ML -- 3.2 Types of Disinformation and Detecting Fabricated Content -- 3.2.1 GAN Images -- 3.2.2 False Videos and Deepfakes -- 3.2.3 Multimodal Content -- 3.3 Software Robots -- 3.3.1 Types of Bots -- 3.4 Social Media and the Spread of Mis- and Disinformation -- 4 The Global Impact of the Spread of Disinformation -- 5 Mitigating the Impact of Mis- and Disinformation -- 6 Conclusion -- References -- How States' Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 1 Introduction -- 2 Background -- 2.1 National Security Being a Vague and Ambiguous Term -- 2.2 Understanding Artificial Intelligence -- 2.2.1 The Notion of Artificial Intelligence -- 2.2.2 Threats and Opportunities of Artificial Intelligence -- 3 Legal Framework of Endangered Human Rights -- 3.1 Right to Life -- 3.2 Right to a Fair Trial -- 3.3 Right to Privacy and Data Protection -- 3.4 Right to Freedom of Expression and Opinion -- 3.5 Right to Freedom of Assembly and Association -- 3.6 Right to Equality: The Prohibition of Discrimination -- 3.7 Right to Free Elections -- 4 National Security Uses of Artificial Intelligence -- 4.1 States' Recourse to Artificial Intelligence in General -- 4.1.1 Problems of Biases, Errors, False Positives and False Negatives -- 4.1.2 Problems of Transparency and Accountability -- 4.2 Surveillance Practices -- 4.2.1 Surveillance Practices Limited Only to Legitimate National Security Purposes.
4.2.2 Surveillance Practices Deployed in Predictive Policing -- 4.2.3 Facial Recognition Combined with Surveillance Practices -- 4.3 Drones and Lethal Autonomous Weapons -- 4.4 AI-Enabled Foreign State Disinformation -- 4.5 Combating Illegal Content Online: Detection of Threats -- 5 Conclusion -- References -- The Use of AI in Managing Big Data Analysis Demands: Status and Future Directions -- 1 Introduction -- 2 Previous Work -- 2.1 Policy -- 2.1.1 People: UN Future Generations (2030) -- 2.1.2 Energy: COP 26 UN Climate Change Conference -- 2.2 Technology -- 2.2.1 Artificial Intelligence (AI) -- 2.2.2 Big Data (BD) -- 2.2.3 Blockchain (BC) -- 2.3 Application -- 2.3.1 People: Health Surveillance -- 2.3.2 Energy: UK Power -- 2.4 Summary -- 3 Research Challenges -- 3.1 Policy -- 3.1.1 People: Data Protection -- 3.1.2 Energy: Predictability -- 3.2 Technology -- 3.2.1 People: Scalability -- 3.2.2 Energy: Security -- 3.3 Applications -- 3.3.1 People: Smart Meter Connectivity -- 3.3.2 Energy: Market Supplier -- 3.4 Summary -- 4 Potential Solutions -- 4.1 Policy -- 4.2 Technology -- 4.3 Application -- 4.4 Summary -- 5 Conclusion and Recommendations -- 5.1 Conclusion -- 5.2 Recommendations -- References -- The Use of Artificial Intelligence in Content Moderation in Countering Violent Extremism on Social Media Platforms -- 1 Introduction -- 2 Definitions -- 2.1 Violent Extremism -- 2.2 CVE -- 3 AI in Content Moderation -- 3.1 Measuring the Accuracy of AI in Content Moderation -- 3.2 Infringements on the Freedom of Expression and Democracy -- 4 The Use of De-platforming Measures -- 5 Conclusion -- References -- A Critical Analysis into the Beneficial and Malicious Utilisations of Artificial Intelligence -- 1 Introduction -- 1.1 Background and Definitions -- 1.1.1 Machine Learning -- 1.1.2 Natural Language Processing -- 1.2 Research Questions.
1.3 The Structure of This Chapter -- 2 The Malicious Use of Artificial Intelligence -- 2.1 Unmanned Aerial Vehicle -- 2.2 3D Printing -- 2.3 Distributed Denial of Service (DDOS) Attacks -- 2.4 Phishing -- 3 The Beneficial Uses of Artificial Intelligence -- 3.1 Efficiency and Automation -- 3.2 Business -- 3.3 Prisons -- 3.4 Counterterrorism -- 4 The Challenges Faced by Artificial Intelligence -- 4.1 Technical Challenges -- 4.1.1 Content Moderation -- 4.1.2 Facial Recognition Bias -- 4.2 Legal Challenges -- 4.2.1 Freedom of Expression -- 4.3 Ethical Challenges -- 5 Conclusion -- References -- Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence -- 1 Introduction -- 2 Background -- 2.1 Cybercrime -- 2.2 Digital Policing -- 2.3 Open Source Intelligence -- 2.4 Social Media Intelligence -- 2.5 Terrorism and Radicalization -- 3 Digital Policing Methods of Countering Terrorism -- 4 Challenges and Recommendations -- 4.1 Ethical and Legal Challenges -- 4.2 Technological Challenges -- 4.3 Organizational Challenges -- 5 Discussion -- 6 Conclusion -- References -- Cyber Threat Prediction and Modelling -- 1 Introduction -- 2 Business Importance of Cyber Threat Prediction and Modelling -- 2.1 What Is an Asset? -- 2.2 What Is a Threat? -- 2.3 What Is a Vulnerability? -- 2.4 What Is the Impact? -- 3 Threat Intelligence -- 4 Developing Your Threat Prediction and Modelling Capabilities -- 4.1 Traditional Threats -- 4.2 Non-traditional Threats -- 5 Threat Modelling -- 5.1 Threat Scenarios -- 6 Using the Mitre ATT& -- CK (MITRE. MITRE ATT& -- CK®) and CAPEC (MITRE. CAPEC - Common Attack Pattern Enumeration and Classification (CAPECTM)) for Cyber Threat Prediction and Modelling -- 7 Conclusion -- References -- A Critical Analysis of the Dark Web Challenges to Digital Policing -- 1 Introduction.
2 Background -- 3 Challenges -- 4 Solutions -- 5 Discussion -- 6 Conclusion -- References -- Insights into the Next Generation of Policing: Understanding the Impact of Technology on the Police Force in the Digital Age -- 1 Introduction -- 2 Changes in the Policing Environment in the Era of Big Data and Artificial Intelligence -- 2.1 Digitisation of Work Models -- 2.2 Expanded Field of Work -- 2.3 Increased Technical Requirements for Police Officers -- 3 Current Status of the Application of Artificial Intelligence and Big Data in Policing -- 3.1 Combating Crime -- 3.2 Serving Society -- 4 Insights Around the Challenges of Digital Policing -- 4.1 Conflict Between Public Safety and Individual Rights -- 4.2 Conflict Between Transparency of Evidence and Black Box Effect -- 4.3 Conflict Between Efficiency and Legality of Law Enforcement -- 4.4 Conflict Between Emerging Crimes and Lagging Laws -- 5 The Future of Digital Policing -- 5.1 Predictive Policing -- 5.2 Collaboration in Policing -- 5.3 Reflections on Enhanced Policing -- 6 Conclusion -- References -- The Dark Web and Digital Policing -- 1 Introduction -- 2 Background -- 3 Challenges -- 4 Recommendations -- 5 Discussion -- 6 Conclusion -- References -- Pre-emptive Policing: Can Technology be the Answer to Solving London's Knife Crime Epidemic? -- 1 Introduction -- 1.1 Statistics -- 1.1.1 Who Is Affected? -- 1.1.2 Why Knife Crime? -- 2 What Is A Knife Crime -- 3 Motivations and Risk Factors for Carrying Knives -- 3.1 Risk Factors -- 3.1.1 Gender -- 3.1.2 Ethnicity -- 3.1.3 Age -- 3.1.4 School Exclusion/Social Exclusion -- 3.1.5 Gangs -- 3.1.6 Adverse Childhood Experiences (ACEs) -- 3.1.7 Poor Relationship with the Police and Local Community Relationships with Police -- 3.1.8 Children and Young People Do Not Trust the Authorities to Protect Them -- 3.1.9 Poor Mental Health -- 3.1.10 Family Life.
3.1.11 Peer Relationships and Friends -- 3.1.12 Material Aspirations -- 3.1.13 Geographical Location -- 3.1.14 Poverty, Inequality, Deprivation and Austerity -- 3.1.15 Peer Pressure or Gang Involvement -- 3.1.16 Drug Dealing -- 3.1.17 Drug Using -- 3.1.18 Previous Arrest/Criminality -- 3.1.19 Fear and Intimidation, Protection -- 3.1.20 Social Status and Respect -- 3.1.21 Utility -- 3.1.22 Victim of Violent Crime -- 3.1.23 Bullying -- 3.1.24 Social Media -- 4 The London Metropolitan Police Force -- 4.1 Structure of MPS -- 4.1.1 The Met Comprises Four Business Groups -- 4.2 Policing Strategies in London Metropolitan Police Service (MPS) -- 4.2.1 Hot-Spot Policing -- 4.2.2 Stop and Search -- 4.2.3 Enhanced Mobility -- 5 Embracing Innovative Technology to Tackle Knife Crime -- 6 The Use of Big Data to Predict Knife-Enabled Homicides or Knife Offences in the London Metropolitan Area -- 6.1 How Can Visualisations Aid Pre-emptive Policing? -- 7 Conclusion -- References.
Record Nr. UNISA-996490355803316
Montasari Reza  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Artificial Intelligence and National Security / / edited by Reza Montasari
Artificial Intelligence and National Security / / edited by Reza Montasari
Autore Montasari Reza
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (229 pages)
Disciplina 355.03
355.03028563
Soggetto topico Artificial intelligence
Computer networks - Security measures
Computer crimes
Machine learning
Artificial Intelligence
Mobile and Network Security
Cybercrime
Machine Learning
Intel·ligència artificial
Seguretat nacional
Xifratge (Informàtica)
Processament de dades
Soggetto genere / forma Llibres electrònics
ISBN 9783031067099
3031067096
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Artificial Intelligence and the Spread of Mis- and Disinformation -- 2. How States’ Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 3. The Use of AI in Managing Big Data Analysis Demands - Status and Future Directions -- 4. The Use of Artificial Intelligence in Content Moderation in Countering Violent Extremism on Social Media Platforms -- 5. A Critical Analysis into the Beneficial and Malicious Utilisations of Artificial Intelligence -- 6. Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence -- 7. Cyber Threat Prediction and Modelling -- 8. A Critical Analysis of the Dark Web Challenges to Digital Policing -- 9. Insights into the next generation of Policing: Understanding the impact of technology on the police force in the digital age -- 10. The Dark Web and Digital Policing -- 11. Pre-emptive policing: Can technology be the answer to solving London’s knife crime epidemic?.
Record Nr. UNINA-9910595028303321
Montasari Reza  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Autore Montasari Reza
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (175 pages)
Disciplina 060
Collana Advances in Information Security
Soggetto topico Computer networks—Security measures
Artificial intelligence
Computer crimes
Mobile and Network Security
Artificial Intelligence
Cybercrime
ISBN 9783031219207
9783031219191
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .
Record Nr. UNISA-996547969703316
Montasari Reza  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Countering Cyberterrorism : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Countering Cyberterrorism : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
Autore Montasari Reza
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (175 pages)
Disciplina 060
363.325
Collana Advances in Information Security
Soggetto topico Computer networks - Security measures
Artificial intelligence
Computer crimes
Mobile and Network Security
Artificial Intelligence
Cybercrime
ISBN 9783031219207
9783031219191
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- SupervisedLearning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- ChillingEffect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .
Record Nr. UNINA-9910637731903321
Montasari Reza  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution : Threats, Assessment and Responses / / by Reza Montasari
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution : Threats, Assessment and Responses / / by Reza Montasari
Autore Montasari Reza
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (276 pages)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer crimes
Artificial intelligence
International criminal law
Criminology
Security systems
Data and Information Security
Cybercrime
Artificial Intelligence
International Criminal Law
Crime Control and Security
Security Science and Technology
ISBN 9783031504549
3031504542
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Unravelling State Crimes: A Critical Analysis of the Iraq War and Its Global Ramifications -- 2. Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3. Understanding and Assessing the Role of Women in Terrorism -- 4. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19 -- 5. Exploring the Imminence of Cyberterrorism Threat to National Security -- 6. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in Contemporary Security Landscape -- 7. Techniques in Countering Cyberterrorism Approaches with Those Adopted by State Adversaries -- 8. Analysing Ethical, Legal, Technical and Operational Challenges of the Application of Machine Learning in Countering Cyber Terrorism -- 9. Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning: Recommendations and Strategies -- 10. The Dual Role of Artificial Intelligence in Online Disinformation: A Critical Analysis.
Record Nr. UNINA-9910805581903321
Montasari Reza  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Navigating the Intersection of Artificial Intelligence, Security, and Ethical Governance : Sentinels of Cyberspace
Navigating the Intersection of Artificial Intelligence, Security, and Ethical Governance : Sentinels of Cyberspace
Autore Montasari Reza
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (173 pages)
Altri autori (Persone) JahankhaniHamid
MasysAnthony J
Collana Advanced Sciences and Technologies for Security Applications Series
ISBN 9783031728211
3031728211
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910983381403321
Montasari Reza  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui