Artificial intelligence and national security / / Reza Montasari
| Artificial intelligence and national security / / Reza Montasari |
| Autore | Montasari Reza |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (229 pages) |
| Disciplina | 355.03 |
| Soggetto topico |
National security - Decision making
Computer security |
| ISBN | 3-031-06709-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Artificial Intelligence and the Spread of Mis- and Disinformation -- 1 Introduction -- 2 Misinformation Versus Disinformation -- 2.1 Information and the Meaning of Truth in a Post-Truth World -- 2.2 The Differences Between Misinformation and Disinformation -- 3 AI, Bots, and the Spread of Mis- and Disinformation -- 3.1 Definitions of AI and ML -- 3.2 Types of Disinformation and Detecting Fabricated Content -- 3.2.1 GAN Images -- 3.2.2 False Videos and Deepfakes -- 3.2.3 Multimodal Content -- 3.3 Software Robots -- 3.3.1 Types of Bots -- 3.4 Social Media and the Spread of Mis- and Disinformation -- 4 The Global Impact of the Spread of Disinformation -- 5 Mitigating the Impact of Mis- and Disinformation -- 6 Conclusion -- References -- How States' Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 1 Introduction -- 2 Background -- 2.1 National Security Being a Vague and Ambiguous Term -- 2.2 Understanding Artificial Intelligence -- 2.2.1 The Notion of Artificial Intelligence -- 2.2.2 Threats and Opportunities of Artificial Intelligence -- 3 Legal Framework of Endangered Human Rights -- 3.1 Right to Life -- 3.2 Right to a Fair Trial -- 3.3 Right to Privacy and Data Protection -- 3.4 Right to Freedom of Expression and Opinion -- 3.5 Right to Freedom of Assembly and Association -- 3.6 Right to Equality: The Prohibition of Discrimination -- 3.7 Right to Free Elections -- 4 National Security Uses of Artificial Intelligence -- 4.1 States' Recourse to Artificial Intelligence in General -- 4.1.1 Problems of Biases, Errors, False Positives and False Negatives -- 4.1.2 Problems of Transparency and Accountability -- 4.2 Surveillance Practices -- 4.2.1 Surveillance Practices Limited Only to Legitimate National Security Purposes.
4.2.2 Surveillance Practices Deployed in Predictive Policing -- 4.2.3 Facial Recognition Combined with Surveillance Practices -- 4.3 Drones and Lethal Autonomous Weapons -- 4.4 AI-Enabled Foreign State Disinformation -- 4.5 Combating Illegal Content Online: Detection of Threats -- 5 Conclusion -- References -- The Use of AI in Managing Big Data Analysis Demands: Status and Future Directions -- 1 Introduction -- 2 Previous Work -- 2.1 Policy -- 2.1.1 People: UN Future Generations (2030) -- 2.1.2 Energy: COP 26 UN Climate Change Conference -- 2.2 Technology -- 2.2.1 Artificial Intelligence (AI) -- 2.2.2 Big Data (BD) -- 2.2.3 Blockchain (BC) -- 2.3 Application -- 2.3.1 People: Health Surveillance -- 2.3.2 Energy: UK Power -- 2.4 Summary -- 3 Research Challenges -- 3.1 Policy -- 3.1.1 People: Data Protection -- 3.1.2 Energy: Predictability -- 3.2 Technology -- 3.2.1 People: Scalability -- 3.2.2 Energy: Security -- 3.3 Applications -- 3.3.1 People: Smart Meter Connectivity -- 3.3.2 Energy: Market Supplier -- 3.4 Summary -- 4 Potential Solutions -- 4.1 Policy -- 4.2 Technology -- 4.3 Application -- 4.4 Summary -- 5 Conclusion and Recommendations -- 5.1 Conclusion -- 5.2 Recommendations -- References -- The Use of Artificial Intelligence in Content Moderation in Countering Violent Extremism on Social Media Platforms -- 1 Introduction -- 2 Definitions -- 2.1 Violent Extremism -- 2.2 CVE -- 3 AI in Content Moderation -- 3.1 Measuring the Accuracy of AI in Content Moderation -- 3.2 Infringements on the Freedom of Expression and Democracy -- 4 The Use of De-platforming Measures -- 5 Conclusion -- References -- A Critical Analysis into the Beneficial and Malicious Utilisations of Artificial Intelligence -- 1 Introduction -- 1.1 Background and Definitions -- 1.1.1 Machine Learning -- 1.1.2 Natural Language Processing -- 1.2 Research Questions. 1.3 The Structure of This Chapter -- 2 The Malicious Use of Artificial Intelligence -- 2.1 Unmanned Aerial Vehicle -- 2.2 3D Printing -- 2.3 Distributed Denial of Service (DDOS) Attacks -- 2.4 Phishing -- 3 The Beneficial Uses of Artificial Intelligence -- 3.1 Efficiency and Automation -- 3.2 Business -- 3.3 Prisons -- 3.4 Counterterrorism -- 4 The Challenges Faced by Artificial Intelligence -- 4.1 Technical Challenges -- 4.1.1 Content Moderation -- 4.1.2 Facial Recognition Bias -- 4.2 Legal Challenges -- 4.2.1 Freedom of Expression -- 4.3 Ethical Challenges -- 5 Conclusion -- References -- Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence -- 1 Introduction -- 2 Background -- 2.1 Cybercrime -- 2.2 Digital Policing -- 2.3 Open Source Intelligence -- 2.4 Social Media Intelligence -- 2.5 Terrorism and Radicalization -- 3 Digital Policing Methods of Countering Terrorism -- 4 Challenges and Recommendations -- 4.1 Ethical and Legal Challenges -- 4.2 Technological Challenges -- 4.3 Organizational Challenges -- 5 Discussion -- 6 Conclusion -- References -- Cyber Threat Prediction and Modelling -- 1 Introduction -- 2 Business Importance of Cyber Threat Prediction and Modelling -- 2.1 What Is an Asset? -- 2.2 What Is a Threat? -- 2.3 What Is a Vulnerability? -- 2.4 What Is the Impact? -- 3 Threat Intelligence -- 4 Developing Your Threat Prediction and Modelling Capabilities -- 4.1 Traditional Threats -- 4.2 Non-traditional Threats -- 5 Threat Modelling -- 5.1 Threat Scenarios -- 6 Using the Mitre ATT& -- CK (MITRE. MITRE ATT& -- CK®) and CAPEC (MITRE. CAPEC - Common Attack Pattern Enumeration and Classification (CAPECTM)) for Cyber Threat Prediction and Modelling -- 7 Conclusion -- References -- A Critical Analysis of the Dark Web Challenges to Digital Policing -- 1 Introduction. 2 Background -- 3 Challenges -- 4 Solutions -- 5 Discussion -- 6 Conclusion -- References -- Insights into the Next Generation of Policing: Understanding the Impact of Technology on the Police Force in the Digital Age -- 1 Introduction -- 2 Changes in the Policing Environment in the Era of Big Data and Artificial Intelligence -- 2.1 Digitisation of Work Models -- 2.2 Expanded Field of Work -- 2.3 Increased Technical Requirements for Police Officers -- 3 Current Status of the Application of Artificial Intelligence and Big Data in Policing -- 3.1 Combating Crime -- 3.2 Serving Society -- 4 Insights Around the Challenges of Digital Policing -- 4.1 Conflict Between Public Safety and Individual Rights -- 4.2 Conflict Between Transparency of Evidence and Black Box Effect -- 4.3 Conflict Between Efficiency and Legality of Law Enforcement -- 4.4 Conflict Between Emerging Crimes and Lagging Laws -- 5 The Future of Digital Policing -- 5.1 Predictive Policing -- 5.2 Collaboration in Policing -- 5.3 Reflections on Enhanced Policing -- 6 Conclusion -- References -- The Dark Web and Digital Policing -- 1 Introduction -- 2 Background -- 3 Challenges -- 4 Recommendations -- 5 Discussion -- 6 Conclusion -- References -- Pre-emptive Policing: Can Technology be the Answer to Solving London's Knife Crime Epidemic? -- 1 Introduction -- 1.1 Statistics -- 1.1.1 Who Is Affected? -- 1.1.2 Why Knife Crime? -- 2 What Is A Knife Crime -- 3 Motivations and Risk Factors for Carrying Knives -- 3.1 Risk Factors -- 3.1.1 Gender -- 3.1.2 Ethnicity -- 3.1.3 Age -- 3.1.4 School Exclusion/Social Exclusion -- 3.1.5 Gangs -- 3.1.6 Adverse Childhood Experiences (ACEs) -- 3.1.7 Poor Relationship with the Police and Local Community Relationships with Police -- 3.1.8 Children and Young People Do Not Trust the Authorities to Protect Them -- 3.1.9 Poor Mental Health -- 3.1.10 Family Life. 3.1.11 Peer Relationships and Friends -- 3.1.12 Material Aspirations -- 3.1.13 Geographical Location -- 3.1.14 Poverty, Inequality, Deprivation and Austerity -- 3.1.15 Peer Pressure or Gang Involvement -- 3.1.16 Drug Dealing -- 3.1.17 Drug Using -- 3.1.18 Previous Arrest/Criminality -- 3.1.19 Fear and Intimidation, Protection -- 3.1.20 Social Status and Respect -- 3.1.21 Utility -- 3.1.22 Victim of Violent Crime -- 3.1.23 Bullying -- 3.1.24 Social Media -- 4 The London Metropolitan Police Force -- 4.1 Structure of MPS -- 4.1.1 The Met Comprises Four Business Groups -- 4.2 Policing Strategies in London Metropolitan Police Service (MPS) -- 4.2.1 Hot-Spot Policing -- 4.2.2 Stop and Search -- 4.2.3 Enhanced Mobility -- 5 Embracing Innovative Technology to Tackle Knife Crime -- 6 The Use of Big Data to Predict Knife-Enabled Homicides or Knife Offences in the London Metropolitan Area -- 6.1 How Can Visualisations Aid Pre-emptive Policing? -- 7 Conclusion -- References. |
| Record Nr. | UNISA-996490355803316 |
Montasari Reza
|
||
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Artificial Intelligence and National Security / / edited by Reza Montasari
| Artificial Intelligence and National Security / / edited by Reza Montasari |
| Autore | Montasari Reza |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (229 pages) |
| Disciplina |
355.03
355.03028563 |
| Soggetto topico |
Artificial intelligence
Computer networks - Security measures Computer crimes Machine learning Artificial Intelligence Mobile and Network Security Cybercrime Machine Learning Intel·ligència artificial Seguretat nacional Xifratge (Informàtica) Processament de dades |
| Soggetto genere / forma | Llibres electrònics |
| ISBN |
9783031067099
3031067096 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Artificial Intelligence and the Spread of Mis- and Disinformation -- 2. How States’ Recourse to Artificial Intelligence for National Security Purposes Threatens Our Most Fundamental Rights -- 3. The Use of AI in Managing Big Data Analysis Demands - Status and Future Directions -- 4. The Use of Artificial Intelligence in Content Moderation in Countering Violent Extremism on Social Media Platforms -- 5. A Critical Analysis into the Beneficial and Malicious Utilisations of Artificial Intelligence -- 6. Countering Terrorism: Digital Policing of Open Source Intelligence and Social Media Using Artificial Intelligence -- 7. Cyber Threat Prediction and Modelling -- 8. A Critical Analysis of the Dark Web Challenges to Digital Policing -- 9. Insights into the next generation of Policing: Understanding the impact of technology on the police force in the digital age -- 10. The Dark Web and Digital Policing -- 11. Pre-emptive policing: Can technology be the answer to solving London’s knife crime epidemic?. |
| Record Nr. | UNINA-9910595028303321 |
Montasari Reza
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
| Countering Cyberterrorism [[electronic resource] ] : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari |
| Autore | Montasari Reza |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (175 pages) |
| Disciplina | 060 |
| Collana | Advances in Information Security |
| Soggetto topico |
Computer networks—Security measures
Artificial intelligence Computer crimes Mobile and Network Security Artificial Intelligence Cybercrime |
| ISBN |
9783031219207
9783031219191 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. . |
| Record Nr. | UNISA-996547969703316 |
Montasari Reza
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Countering Cyberterrorism : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari
| Countering Cyberterrorism : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity / / by Reza Montasari |
| Autore | Montasari Reza |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (175 pages) |
| Disciplina |
060
363.325 |
| Collana | Advances in Information Security |
| Soggetto topico |
Computer networks - Security measures
Artificial intelligence Computer crimes Mobile and Network Security Artificial Intelligence Cybercrime |
| ISBN |
9783031219207
9783031219191 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Government’s Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- SupervisedLearning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- ChillingEffect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. . |
| Record Nr. | UNINA-9910637731903321 |
Montasari Reza
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution : Threats, Assessment and Responses / / by Reza Montasari
| Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution : Threats, Assessment and Responses / / by Reza Montasari |
| Autore | Montasari Reza |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (276 pages) |
| Disciplina | 005.8 |
| Collana | Advanced Sciences and Technologies for Security Applications |
| Soggetto topico |
Data protection
Computer crimes Artificial intelligence International criminal law Criminology Security systems Data and Information Security Cybercrime Artificial Intelligence International Criminal Law Crime Control and Security Security Science and Technology |
| ISBN |
9783031504549
3031504542 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Unravelling State Crimes: A Critical Analysis of the Iraq War and Its Global Ramifications -- 2. Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3. Understanding and Assessing the Role of Women in Terrorism -- 4. Exploring the Current Landscape of Cyberterrorism: Insights, Strategies, and the Impact of COVID-19 -- 5. Exploring the Imminence of Cyberterrorism Threat to National Security -- 6. The Impact of Technology on Radicalisation to Violent Extremism and Terrorism in Contemporary Security Landscape -- 7. Techniques in Countering Cyberterrorism Approaches with Those Adopted by State Adversaries -- 8. Analysing Ethical, Legal, Technical and Operational Challenges of the Application of Machine Learning in Countering Cyber Terrorism -- 9. Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning: Recommendations and Strategies -- 10. The Dual Role of Artificial Intelligence in Online Disinformation: A Critical Analysis. |
| Record Nr. | UNINA-9910805581903321 |
Montasari Reza
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Navigating the Intersection of Artificial Intelligence, Security, and Ethical Governance : Sentinels of Cyberspace
| Navigating the Intersection of Artificial Intelligence, Security, and Ethical Governance : Sentinels of Cyberspace |
| Autore | Montasari Reza |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
| Descrizione fisica | 1 online resource (173 pages) |
| Altri autori (Persone) |
JahankhaniHamid
MasysAnthony J |
| Collana | Advanced Sciences and Technologies for Security Applications Series |
| ISBN |
9783031728211
3031728211 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910983381403321 |
Montasari Reza
|
||
| Cham : , : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||