Believing in Ghosts

2021 ◽  
Vol 2 (1) ◽  
pp. 48-69
Author(s):  
André Lopes ◽  

What does it mean to be alive? At what point does artificial intelligence know enough to be alive? Does the Turing test even matter? If we want the best government policy possible, does it matter if it comes from a computer? In this work of philosophical short story fiction, Rain is hired to do cyber-security for Presidential candidate Mr. Booker. There is a cyber-attack into Booker’s computer network and Rain is called to answer for the breach. In the process of digging into the data, Rain finds out that Booker is an actor, what is known in society as a “ghost,” and that all of the policy and speeches he has been given are being written by a sophisticated artificial intelligence using polling and other data. He says, literally, the perfect things at the perfect times, to the perfect audience. While artificial people, like news reporters, bloggers, actors, and influencers, are slowly becoming standard in this near future story, the idea of a politician being nothing more but an actor serving as a vessel for AI is unprecedented. Before Rain can decide what to do with her newfound information she is framed and is forced to use all her computer skills just to keep herself out of jail.

2020 ◽  
Vol 4 (02) ◽  
pp. 61-68
Author(s):  
Todd J. Barry

This brief conceptual article starts with an argument for Artificial Intelligence (AI)’s ability to “think.”  This outgrowth relates to human’s and AI’s power over nature, and to AI’s increasing power in its humanness, measured by the results of competing with humans and other AI machines in the Turing Test, and economic “game theory.”  Both, and especially the latter challenge, can be quintessentially human by measuring how one values the self as opposed to society, under varying conditions.  Given AI’s advancements enabling it to presumably “win” in the most humanness of games, beyond even reaching a universally beneficial “social optimal” outcome, and thus possibly even having more power than humankind, the article argues for an equilibrium of balanced powers in innovation between AI and humans.  Therefore, managers, broadly construed, can function as key brokers between government policy makers and innovators as AI and humans continue to develop further into the future.


2013 ◽  
Vol 3 (3) ◽  
pp. 49-71 ◽  
Author(s):  
T. J. Grant

Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under government authority compliant with national and international law. Our research focuses on offensive cyber operations (i.e. computer network exploitation and attack). The cyber unit must be provided with the right resources, in the form of accommodation, computing and networking infrastructure, tools and technologies, doctrine, and training. We contend that the open literature gives an unbalanced view of what tools and technologies a professional group needs because it emphasizes malware and, to a lesser extent, the delivery media used by cyber criminals. Hence, the purpose of this paper is to identify systematically the tools and technologies needed for professional, offensive cyber operations. A canonical model of the cyber attack process was obtained by rationally reconstructing a set of existing attack process models found in the literature. This canonical model was formalized using Structured Analysis and Design Technique (SADT) notation, in which processes are logically linked by inputs, outputs, controls, and mechanisms. A set of tools and technologies was extracted from the mechanisms. The canonical model and set of tools and technologies have been checked by subject matter experts.


2019 ◽  
Vol 8 (3) ◽  
pp. 6133-6140 ◽  

Threat intelligence is the procurement of evidence-based knowledge about current or potential threats. The interest of threat intelligence comprises of advancement in efficiency and boosting effectiveness in terms of analytical and prevention capabilities. Cybersecurity represents serious interest for numerous organizations because maximum of them are using Internet-connected data devices which are opening doors for cyber attackers. Outstanding threat intelligence within the cyber sphere requests for the knowledge base of threat information and a thoughtful way to represent this knowledge. This study proposes a clear rationale of significant artificial intelligence (AI) techniques used for recognizing a cyber-attack. Data analysis can be formulated to guide industries and Internet-connected systems such as smartphones or robotic factories on what to do in the appearance of an incident. AI techniques will analyze past incidents and summarize knowledge from experts and will continue to adapt or reform new branches as it reviews from the new incidents. In addition, various data mining approaches used in boosting threat truthfulness in cybersecurity data are also studied. To conclude, we discussed that; AI will robotize the collation of machine-readable external threats and will improve the efficiency and accuracy of the data for each smart organization’s specific framework.


AI Magazine ◽  
2019 ◽  
Vol 40 (3) ◽  
pp. 67-78
Author(s):  
Guy Barash ◽  
Mauricio Castillo-Effen ◽  
Niyati Chhaya ◽  
Peter Clark ◽  
Huáscar Espinoza ◽  
...  

The workshop program of the Association for the Advancement of Artificial Intelligence’s 33rd Conference on Artificial Intelligence (AAAI-19) was held in Honolulu, Hawaii, on Sunday and Monday, January 27–28, 2019. There were fifteen workshops in the program: Affective Content Analysis: Modeling Affect-in-Action, Agile Robotics for Industrial Automation Competition, Artificial Intelligence for Cyber Security, Artificial Intelligence Safety, Dialog System Technology Challenge, Engineering Dependable and Secure Machine Learning Systems, Games and Simulations for Artificial Intelligence, Health Intelligence, Knowledge Extraction from Games, Network Interpretability for Deep Learning, Plan, Activity, and Intent Recognition, Reasoning and Learning for Human-Machine Dialogues, Reasoning for Complex Question Answering, Recommender Systems Meet Natural Language Processing, Reinforcement Learning in Games, and Reproducible AI. This report contains brief summaries of the all the workshops that were held.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Sign in / Sign up

Export Citation Format

Share Document