Safe Distances

Author(s):  
Shalin Hai-Jew

Online human-to-human (and human-to-robot) hyper-personal relationships have evolved over the years, and their prevalence has broadened the available cyberattack surfaces. With the deployment of malicious socialbots on social media in the virtual and AI-informed embodied socialbots in the real, human interests in socializing have become more fraught and risky. Based on the research literature, abductive reasoning from in-world experiences, and analogical analysis to project into the Fourth Industrial Revolution, this work suggests the importance of greater awareness of the risks in interrelating in the virtual and the real and suggests that there are no safe distances.

Author(s):  
Shalin Hai-Jew

Online human-to-human (and human-to-robot) hyper-personal relationships have evolved over the years, and their prevalence has broadened the available cyberattack surfaces. With the deployment of malicious socialbots on social media in the virtual and AI-informed embodied socialbots in the real, human interests in socializing have become more fraught and risky. Based on the research literature, abductive reasoning from in-world experiences, and analogical analysis to project into the Fourth Industrial Revolution, this work suggests the importance of greater awareness of the risks in interrelating in the virtual and the real and suggests that there are no safe distances.


2019 ◽  
Vol 2019 ◽  
Author(s):  
Indra Ayu Susan Mckie ◽  
Bhuva Narayan

Conversational bots, otherwise known as chatbots, operate within the fourth industrial revolution as a client facing form of AI. They are communicative interfaces that mimic human conversation to deliver information in a highly personalised way. The user experience of chatbots can change the way individuals, groups and organisations define themselves online (Whitley, Gal & Kjaergaard, 2014). This paper discusses the opportunities in building an online identity via chatbots, with emphasis on harnessing the properties of chatbots to develop trust with users. Currently, organisations are limited to the properties and affordances of web browsers, search engines and social media to communicate a “shared symbolic representation” (Gioia, 1998). This paper focuses on organisational identities on the Internet, and details both opportunities and vulnerabilities in establishing trust with users through chatbots.


Author(s):  
Shalin Hai-Jew

From curated “cyberwar” text sets (from government, mainstream journalism, academia, and social media), six-word stories are computationally induced (using word frequency counts, text searches, word network analysis, word clustering, and other means), supported by post-induction human writing. The resulting inducted six-word stories are used to (1) describe and summarize the underlying textual information (to enable a bridge to a complex topic); (2) produce insights about the underlying textual information and related in-world phenomena; and (3) answer particular research questions. These resulting six-word stories are analyzed along multiple dimensions: data sources (government, journalism, academia, and social media), expert calls-and-crowd responses, and by time periods (pre-cyberwar and cyberwar periods). The efficacy of this six-word story induction process is evaluated, and the extracted six-word stories are applied to cyberwar potentials during the Fourth Industrial Revolution (4IR).


Sign in / Sign up

Export Citation Format

Share Document