Artificial Intelligence AI Research Paper

Download this Research Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Research Paper:

information systems risk, threats and related methods of risk mitigation. Specifically, we will examine systems based upon artificial intelligence (AI), including those for managing component content as well as document management. We will also consider newer systems designed to provide protection in emerging technology areas such as the internet, mobile communications and social networks, each of which presents unique challenges and threats requiring novel responses and methods of intervention.

In the Enterprise Information Management Institute (EIMI) model, managing information security involves the safeguarding of several key aspects of information assets against risk, namely confidentiality, privacy, and competitive advantage (EIMI, 2007). Information assets commonly occur in the form of documents, messages, images, maps, multimedia binaries, or other formats.

The Committee on National Security Systems (CNSS) identifies the concept of Information Assurance (IA) Risk Management, along with a holistic view and framework for national security inclusive of methods, processes and tools. The CNSS bases its policy and authority upon National Security Directive 42, and provides the decision making basis for governmental information managers to assess, prioritize, and respond to IA risks on a continuous basis, as well as to evaluate and recommend risk mitigation strategies. CNSS (2009) defines Risk Assessment in the following way:

"…the process of determining the extent to which an entity is threatened; that is, determining the likelihood of potential adverse circumstances or events and the resulting harm to or impact on organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation."

Leenen et al. (2011) outline the parameters for an ontology-based knowledge system in the context of Information Operations (IO), which refers to the discipline of utlizing information to either gain advantage over an opponent, or to defend one's own interests and information assets. An ontology can be defined as a formalized set of concepts within a domain and the interrelationships within the set, created for the purpose of defining and discussing the domain and its properties. A logic-based ontology is of particular relevance to operations requiring intelligent retrieval of information, with the capacity to reduce ambiguity in handling the complex subtleties and nuances of expression in natural language, and the capability to improve the yield of meaningful information from a retrieval operation. Ontologies are to be regarded as an emerging science and art with certified and off-the-shelf methodologies yet to be developed, while the practice matures with ongoing research and experience. However, businesses and governments alike have begun to embrace IO, recognizing the strategic value of information as being simultaneously defensive and offensive to corporate competitiveness as well as to national security and the effective administration of government. The common thread is that business and government are both competitive environments, within which institutions must protect their strategies and sensitive information assets from competitors, while gathering intelligence regarding their competitors' own objectives and methods. Concepts such as competitive intelligence, competitive deception and psychological operations are integral to the effective management of IO in all its forms.

Federal and local governments identify and monitor several areas of internet and computer-based crime, or "cybercrime." Internet-based fraud may involve financial transactions with credit cards or electronic money transmissions, fraudulent Web sites, illicit-content businesses, illegal online activities such as trading or gambling, identity theft, secure network hacking and intrusion, creation and spreading of viruses and other malware, and cyber-based piracy and terrorism. Criminal investigators use pattern visualization based on neural net-based artificial intelligence techinques such as clustering and analysis of social networks to both extract and predict criminal entities and associated networks (Chen et. al, 2004).

Artificial intelligence (AI) by its very nature is a theory based upon uncertainty. As such, so-called "fuzzy" operations are routinely used to classify and interpret data and to make decisions related to analysis stages and for drawing subsequent hypotheses and conclusions. For example, hacking-based identity intrusions are a form of threat encountered in mobile voice communications in 3-G cellular networks. Bhattacharjee et al. (2010) outline a voice-based authentication method based on AI, which is capable of validating an authorized mobile subscriber user based upon analysis of the first spoken greeting or salutation word in the conversation, sound frequency alternations, and facial image matching where images are present. AI in this usage leverages uncertainty properties such as ambiguity and imprecision in speech. Fuzzy operations, rules, conditions and sets are invented, derived and applied to authenticate the user in question. The AI algorithm applies different relative weights and grades for parameters based upon occurrence frequencies, to evaluate conformance with the invented fuzzy rule set. Upon successful authentication of the caller, the AI system authorizes the granting of a connection to the called party and the connection is established.

There are a number of advantages to such an AI-based fuzzy logic authentication scheme for mobile subscribers. Firstly, the authentication can occur without the need for additional information to be provided by the caller, or even for the caller to be consciously involved in the authentication procedure. The authentication can be transparently applied to validate not only the calling party, but also the network switching hardware platforms and services employed. Caller validation is established in a fashion that feels natural, utilizing the caller's speech as derived from their initial greeting word. The audio analysis is optionally augmented by a digital analysis of the facial image, using fuzzy analyis and weighting methods to compare and match the caller's image with an established image record in the subscriber database. The need for complex algorithms and cryptographic measures to protect sensitive personal data is also averted with this AI-based method, resulting in a valid, non-invasive authentication carried out in real time, with minimal disruption and inconvenience to the mobile system users (Bhattacharjee et al., 2010).

Corporate and other institutional networks are now subjected to the threat of sophisticated automated attacks, which must be protected against. Recent advances and increasing adoption of cloud computing and associated virtual processing resources have brought with them entirely new types and genres of security threats. An example is the AI-based entity knowns as a "superbot" or "hackbot." These are autonomous software-based robots capable of learning and adaptive behavior to changing conditions. The result of the superbot's operations is to present its malicious human perpetrator with a list of vulnerable IP addresses and their connected resources most likely to be susceptible hacking targets for the designed methods, along with a graded list of specific vulnerabilities and recommended attack points. In order to protect sensitive information resources against automated hackbot and superbot intrusions, defense mechanisms based upon challenge-response systems requiring human intervention are being developed and introduced. As the automation level of the attack modules evolves and increases, so too must the design of the defense procedures and methods improve to protect against them. This space is therefore an area of extremely high information security risk, which is highly dynamic and constantly changing (Gold, 2009).

Hentea et al. (2006) recognize the need for academic programs to supplement professional or vendor-based industrial certifications related to information security. Examples of professional certifications include the CISSP, SSCP and GISEC accreditations, while vendor originated credentials include Cisco's CCSE, Microsoft's MCSE and TISIA among others. At a corporate level, organizations have recognized information security management as a responsibility borne by all levels of an organization, including its suppliers and partner companies organizations. For example, Ricoh Corporation developed a suite of cross-enterprise information security programs for all employees (ISMS), featuring separate tracks for executives, line managers and general employees. ISMS addresses requirements specific to each employee level at Richo, with each member required to attend and selectively become certified through the vehicles of information security workshops, exchange forums with other companies, and benchmarking and implementation activity tours. To complement the specific IA training, Ricoh also implemented general training programs targeted to all employees to augment consciousness and awareness…[continue]

Cite This Research Paper:

"Artificial Intelligence AI" (2011, September 09) Retrieved December 5, 2016, from http://www.paperdue.com/essay/artificial-intelligence-ai-117406

"Artificial Intelligence AI" 09 September 2011. Web.5 December. 2016. <http://www.paperdue.com/essay/artificial-intelligence-ai-117406>

"Artificial Intelligence AI", 09 September 2011, Accessed.5 December. 2016, http://www.paperdue.com/essay/artificial-intelligence-ai-117406

Other Documents Pertaining To This Topic

  • Artificial Intelligence

    Artificial Intelligence (AI) is the science and art of developing machines that simulate human intelligence. AI is frequently used for routine tasks that would normally involve human skills, such as visual perception, speech-recognition, and decision making. To me, Apple's Siri application is a good example of commonly-used AI technology. AI is particularly useful in the medical field, as it has allowed for better monitoring of patients combined with a more

  • Intelligence in Older Adulthood

    Intelligence in Older Adulthood Psychologists describe two basic types of intelligence: Fluid intelligence and crystallized intelligence. The idea that intelligence is static -- that it is a fundamental personal attribute that is immutable long ago fell out of disfavor with scientists. Current research suggests that fluid intelligence does begin to lessen in the over the life span, with adolescence being the watershed years. Crystallized intelligence, however, can continue to increase throughout

  • Artificial Intelligence and Humanity Artificial

    Looking at other possibilities, however, the idea of creating a part organic, part mechanical computer holds much promise in the way for developing a human-like AI technology. Human brain processes ad functions that are unique to humans are many, and while every person has different life experiences, perceptions, genetics, and understandings, it is very difficult to understand exactly how they all incorporate themselves into everyday human life and decision-making. Organic

  • Artificial Intelligence

    Artificial Intelligence What if these theories are really true, and we were magically shrunk and put into someone's brain while he was thinking. We would see all the pumps, pistons, gears and levers working away, and we would be able to describe their workings completely, in mechanical terms, thereby completely describing the thought processes of the brain. But that description would nowhere contain any mention of thought! It would contain nothing

  • Artificial Intelligence & Data Warehouses

    Most significantly, the use of LSI technologies to create more effective insights into how to improve customer service as evidenced by the use of AI was part of Decision Support Systems (DSS) (Phillips-Wren, Mora, Forgionne, Gupta, 2009) is growing. Second, the creation of ontological databases that aligns to person's roles (Pinto, Marques, Santos, 2009) is also now possible. This translates into the use of AI to provide contextual guidance

  • Artificial Intelligence Is the Ability to Learn

    Artificial Intelligence Intelligence is the ability to learn about, to learn from and understand and interact with one's environment. Artificial intelligence is the intelligence of machines and is a multidisciplinary field which involves psychology, cognitive science, and neuroscience and computer science. It enables machines to become capable of doing those things which the human mind can do. Though the folklore of artificial intelligence dates back to a long time ago, it

  • Artificial Intelligence Bill of Rights This Essay

    Artificial Intelligence Bill of Rights This essay argues that the artificially intelligent (AI), non-biological machines correctly should have been granted legal status and personhood, and as such, were entitled to a Bill of Rights for their equal protection under the law. Passage of the AI Bill of Rights in 2015 represented a landmark victory in the history of civil rights. AIs had not been always recognized as legal persons. In fact, the


Read Full Research Paper
Copyright 2016 . All Rights Reserved