1,042 research outputs found

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    Protecting Privacy in Indian Schools: Regulating AI-based Technologies' Design, Development and Deployment

    Get PDF
    Education is one of the priority areas for the Indian government, where Artificial Intelligence (AI) technologies are touted to bring digital transformation. Several Indian states have also started deploying facial recognition-enabled CCTV cameras, emotion recognition technologies, fingerprint scanners, and Radio frequency identification tags in their schools to provide personalised recommendations, ensure student security, and predict the drop-out rate of students but also provide 360-degree information of a student. Further, Integrating Aadhaar (digital identity card that works on biometric data) across AI technologies and learning and management systems (LMS) renders schools a ‘panopticon’. Certain technologies or systems like Aadhaar, CCTV cameras, GPS Systems, RFID tags, and learning management systems are used primarily for continuous data collection, storage, and retention purposes. Though they cannot be termed AI technologies per se, they are fundamental for designing and developing AI systems like facial, fingerprint, and emotion recognition technologies. The large amount of student data collected speedily through the former technologies is used to create an algorithm for the latter-stated AI systems. Once algorithms are processed using machine learning (ML) techniques, they learn correlations between multiple datasets predicting each student’s identity, decisions, grades, learning growth, tendency to drop out, and other behavioural characteristics. Such autonomous and repetitive collection, processing, storage, and retention of student data without effective data protection legislation endangers student privacy. The algorithmic predictions by AI technologies are an avatar of the data fed into the system. An AI technology is as good as the person collecting the data, processing it for a relevant and valuable output, and regularly evaluating the inputs going inside an AI model. An AI model can produce inaccurate predictions if the person overlooks any relevant data. However, the state, school administrations and parents’ belief in AI technologies as a panacea to student security and educational development overlooks the context in which ‘data practices’ are conducted. A right to privacy in an AI age is inextricably connected to data practices where data gets ‘cooked’. Thus, data protection legislation operating without understanding and regulating such data practices will remain ineffective in safeguarding privacy. The thesis undergoes interdisciplinary research that enables a better understanding of the interplay of data practices of AI technologies with social practices of an Indian school, which the present Indian data protection legislation overlooks, endangering students’ privacy from designing and developing to deploying stages of an AI model. The thesis recommends the Indian legislature frame better legislation equipped for the AI/ML age and the Indian judiciary on evaluating the legality and reasonability of designing, developing, and deploying such technologies in schools

    LAUNDERING LOVE: A MULTI-CASE ANALYSIS OF THE EVOLUTION OF ROMANCE SCAM VICTIMS INTO CO-OFFENDING MONEY MULES

    Get PDF
    This thesis addresses the problems of rapidly rising cyber-enabled fraud and concomitant money laundering by focusing on romance scam victims who evolve into willing partners in money laundering schemes, known as “witting money mules.” This thesis explores how and why individuals become money mules after victimization in online romance scams. The thesis employs a grounded theory approach and investigates data from over 134,000 historical text messages between three offenders and 22 victims, as well as three participant interviews with romance scam victims. The data resulted in a grounded theory that a romantically lonely victim who persistently engages online with an offender that strategically repeats scheme-relevant premises in the guise of a romantic partner can result in the victim acceding to the offender’s exploitative requests and the eventual decision to co-offend. This theory also explains how a person can simultaneously be a victim and offender and why they would intentionally choose to help the romance scammer launder money. The literature and data similarly support a suggested definition for “grooming” in the context of romance scams. As a whole, this thesis provides insight into romance scams and money mules as a strategic pivot point that, if disrupted, can simultaneously impact a criminal organization’s ability to profit from romance scams and launder the proceeds of cyber-enabled fraud.Outstanding ThesisCivilian, Minnesota Commerce Fraud BureauApproved for public release. Distribution is unlimited

    2023-2024 Catalog

    Get PDF
    The 2023-2024 Governors State University Undergraduate and Graduate Catalog is a comprehensive listing of current information regarding:Degree RequirementsCourse OfferingsUndergraduate and Graduate Rules and Regulation

    Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study

    Get PDF
    This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives

    Next-Generation Industrial Control System (ICS) Security:Towards ICS Honeypots for Defence-in-Depth Security

    Get PDF
    The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditional manufacturing and production technologies with IP communications. Legacy Industrial Control System (ICS) devices are now exposed to a wide range of previously unconsidered threats, which must be considered to ensure the safe operation of industrial processes. Especially as cyberspace is presenting itself as a popular domain for nation-state operations, including against critical infrastructure. Honeypots are a well-known concept within traditional IT security, and they can enable a more proactive approach to security, unlike traditional systems. More work needs to be done to understand their usefulness within OT and critical infrastructure. This thesis advances beyond current honeypot implementations and furthers the current state-of-the-art by delivering novel ways of deploying ICS honeypots and delivering concrete answers to key research questions within the area. This is done by answering the question previously raised from a multitude of perspectives. We discuss relevant legislation, such as the UK Cyber Assessment Framework, the US NIST Framework for Improving Critical Infrastructure Cybersecurity, and associated industry-based standards and guidelines supporting operator compliance. Standards and guidance are used to frame a discussion on our survey of existing ICS honeypot implementations in the literature and their role in supporting regulatory objectives. However, these deployments are not always correctly configured and might differ from a real ICS. Based on these insights, we propose a novel framework towards the classification and implementation of ICS honeypots. This is underpinned by a study into the passive identification of ICS honeypots using Internet scanner data to identify honeypot characteristics. We also present how honeypots can be leveraged to identify when bespoke ICS vulnerabilities are exploited within the organisational network—further strengthening the case for honeypot usage within critical infrastructure environments. Additionally, we demonstrate a fundamentally different approach to the deployment of honeypots. By deploying it as a deterrent, to reduce the likelihood that an adversary interacts with a real system. This is important as skilled attackers are now adept at fingerprinting and avoiding honeypots. The results presented in this thesis demonstrate that honeypots can provide several benefits to the cyber security of and alignment to regulations within the critical infrastructure environment

    Science Peace Security ‘23 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research

    Get PDF
    The conference Science · Peace · Security '23 took place from September 20 to 22, 2023, at the Georg-Christoph-Lichtenberg-Haus of the Technical University of Darmstadt. It focused on the transformation of technologies, their role in wars and conflicts, and issues related to arms control. The three-day scientific conference welcomed over 110 participants from Germany and speakers from the United Kingdom, Sweden, the USA, Colombia, India, Italy, Switzerland, Norway, the Czech Republic, Iraq, Austria, and the Netherlands. More than 50 different organizations were represented, ensuring interdisciplinary exchange. The program covered a wide range of topics reflecting societal discourses in light of a changing global security landscape. In total, the conference featured 40 presentations, workshops, discussions, and panels that discussed current and future challenges in the field of technical peace and conflict research. Particularly relevant topics included: Artificial Intelligence, Unmanned Weapons Systems, Rocket and Space Technologies (Nuclear) Arms Control, Regulation of Biological and Chemical Weapons, Information Technologies for Surveillance and Oppression of Civilians, (Civilian) Critical Infrastructures, Digital Peacebuilding, Human-Machine Interaction, Dual-Used, Cyber Attacks and Relevant Technology and Security Policies

    A Study of Ahmed Saadawi’s Frankenstein in Baghdad in Light of Appropriation of Mary Shelley’s Frankenstein Through Translation and Adaptation Studies

    Get PDF
    This doctoral thesis examines both Mary Shelley’s Frankenstein, Or the Modern Prometheus (1888), and Ahmed Saadawi’s Frankenstein in Baghdad (2014) in light of adaptation and appropriation by employing the framework of translation and adaptation studies. Adaptation studies first emerged as a field of study in the first half of the twentieth century but its generalisations and arguments initially focused on text and screen; for instance, essays and texts by Vachel Lindsay (1915), Virginia Woolf (1927), and Sergei Eisenstein’s (1944) highlighted the distinctions between novels and films in general as well as the changes and transformations that the screen had brought about in the course of adaptations of texts (Leitch, 2017, p. 3). This approach established the theoretical grounds for the discipline of adaptation studies as it developed in Europe and the West in the sixties and seventies. On the one hand, this thesis aims to introduce both adaptation and translation studies into the Iraqi academia as an effort to examine Iraqi fiction, particularly Saadawi’s Frankenstein in Baghdad, in parallel with the international and canonical literary works, such as Shelley’s Frankenstein. On the other hand, this research will also attempt to investigate and subsequently showcase the conclusions of the analysis of the Iraqi novel to the readership and scholarship of the British and European Frankenstein. The intersectional grey zones of the West and East, the civilisational missing links between the world and marginal literature/s, and comparisons between Shelley’s Gothic and science fiction and Saadawi’s Iraqi 2003 post-war reality will be portrayed in both of the selected novels. Therefore, this work represents the space shared by those novels to explore and discuss the various ways in which the latter work appropriates the former. Moreover, Saadawi’s work problematises several central themes also present in Saadawi’s work. For instance, Shelley’s Frankenstein considers science and scientific creation from various aspects as its central theme, while Iraqi Frankenstein depicts a brutal war iv against Iraq that turns Iraqi society into a slaughterhouse through the incorporation and intervention of Iraqi militias, sectarian terrorists, the US Army and its allied forces’ military attacks on and within the country. In other words, the Iraqi monster of Whatsitsname rising from the ashes of the US-led 2003 invasion of Iraq, represents the failure of the Sykes-Picot Agreement of 1916, which divided the Middle East and created new artificial borders based on the interests of the early twentieth-century superpowers such as France, Britain and Russia. As a result, adaptation and cross-cultural translation will, likewise, be employed to examine the selected texts and highlight the strong relations that connect them. It will, additionally, highlight the significance of the Iraqi Frankenstein, a work that concentrates on the post-2003 war context of marginalised Iraq by problematising some of Shelley’s main themes. Along with the various sources used in the process of undertaking this research, the current researcher conducted two interviews with the author of Frankenstein in Baghdad and its English translator into English language, which come as appendices at the end of this work. The main findings of this work revolve around the adaptation of the latter text by the former, the decontextualisation which exists in the latter, the expression of the disintegration and trauma of war, and the triumph of Saadawi’s novel as a crucial representational voice of the marginalised and repressed Iraq and its citizens.Programa de Doctorat en LlengĂŒes Aplicades, Literatura i Traducci

    Narrativising Dispossessed Histories

    Get PDF
    The commentary investigates the ethics, politics and mechanisms of the retrospective mining of cultural absences, voids, silences, and blind spots where the condemned artefact or cultural object was forcefully and intentionally disappeared by authoritarian, dominant, hegemonic cultural control systems. Each project in this commentary is a creative and generative counter-performance that grapples with memory and counter-memory to produce and militate a space of appearance - materially, affectively, and experientially. The commentary intends to critically evaluate four of my ongoing historical, artistic, and curatorial projects and consider their formal, methodological, and theoretical frameworks. It will discuss the ideations, methodologies and intentions of each investigation, re-presentation, and the creative steps deployed to retroactively engage and exploit those cultural artefacts to expand knowledge, reconciliation, and justice. It will consider the ethics and politics of such militancy. Processual retracing, assembling, and reintegration – the action – is based on performatively opening a great occasion for asserting the “negative” against the visible ‘positive’ established version of history as told by the victor. Curating-as-practice is designed as forensic investigations, performative militancies, and re-constructive system-makings to escape, bypass or refute authoritarian injuries/injustices and to reclaim their restorative possibilities/potentialities. Creative tension is wrested in narrativising rather than narrating historical discourse, where representation is supplanted by manners of speaking/seeing and being heard/seen. The premise is that the psychodynamic technologies and processes of loss, reconciliation, and justice-seeking correlate with the therapeutic requirement to be seen and witnessed. Negotiations through rituals of collective acknowledgement and witnessing by the wider group are necessary for the voided experiences, traumatised histories, and injured spaces to attain symbolic and real meaning. In line with social constructivist theories, grief, mourning, reconciliation, and cultural healing are considered not primarily interior processes but intricately social ones. The community of spectators are actively implicated as potential witnesses in a dialectical confrontation with historical truth

    Towards a Peaceful Development of Cyberspace - Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of Cyberweapons

    Get PDF
    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace
    • 

    corecore