¶ … information systems risk, threats and related methods of risk mitigation. Specifically, we will examine systems based upon artificial intelligence (AI), including those for managing component content as well as document management. We will also consider newer systems designed to provide protection in emerging technology areas such as the internet, mobile communications and social networks, each of which presents unique challenges and threats requiring novel responses and methods of intervention.
In the Enterprise Information Management Institute (EIMI) model, managing information security involves the safeguarding of several key aspects of information assets against risk, namely confidentiality, privacy, and competitive advantage (EIMI, 2007). Information assets commonly occur in the form of documents, messages, images, maps, multimedia binaries, or other formats.
The Committee on National Security Systems (CNSS) identifies the concept of Information Assurance (IA) Risk Management, along with a holistic view and framework for national security inclusive of methods, processes and tools. The CNSS bases its policy and authority upon National Security Directive 42, and provides the decision making basis for governmental information managers to assess, prioritize, and respond to IA risks on a continuous basis, as well as to evaluate and recommend risk mitigation strategies. CNSS (2009) defines Risk Assessment in the following way:
"…the process of determining the extent to which an entity is threatened; that is, determining the likelihood of potential adverse circumstances or events and the resulting harm to or impact on organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation."
Leenen et al. (2011) outline the parameters for an ontology-based knowledge system in the context of Information Operations (IO), which refers to the discipline of utlizing information to either gain advantage over an opponent, or to defend one's own interests and information assets. An ontology can be defined as a formalized set of concepts within a domain and the interrelationships within the set, created for the purpose of defining and discussing the domain and its properties. A logic-based ontology is of particular relevance to operations requiring intelligent retrieval of information, with the capacity to reduce ambiguity in handling the complex subtleties and nuances of expression in natural language, and the capability to improve the yield of meaningful information from a retrieval operation. Ontologies are to be regarded as an emerging science and art with certified and off-the-shelf methodologies yet to be developed, while the practice matures with ongoing research and experience. However, businesses and governments alike have begun to embrace IO, recognizing the strategic value of information as being simultaneously defensive and offensive to corporate competitiveness as well as to national security and the effective administration of government. The common thread is that business and government are both competitive environments, within which institutions must protect their strategies and sensitive information assets from competitors, while gathering intelligence regarding their competitors' own objectives and methods. Concepts such as competitive intelligence, competitive deception and psychological operations are integral to the effective management of IO in all its forms.
Federal and local governments identify and monitor several areas of internet and computer-based crime, or "cybercrime." Internet-based fraud may involve financial transactions with credit cards or electronic money transmissions, fraudulent Web sites, illicit-content businesses, illegal online activities such as trading or gambling, identity theft, secure network hacking and intrusion, creation and spreading of viruses and other malware, and cyber-based piracy and terrorism. Criminal investigators use pattern visualization based on neural net-based artificial intelligence techinques such as clustering and analysis of social networks to both extract and predict criminal entities and associated networks (Chen et. al, 2004).
Artificial intelligence (AI) by its very nature is a theory based upon uncertainty. As such, so-called "fuzzy" operations are routinely used to classify and interpret data and to make decisions related to analysis stages and for drawing subsequent hypotheses and conclusions. For example, hacking-based identity intrusions are a form of threat encountered in mobile voice communications...
Artificial Intelligence Intelligence is the ability to learn about, to learn from and understand and interact with one's environment. Artificial intelligence is the intelligence of machines and is a multidisciplinary field which involves psychology, cognitive science, and neuroscience and computer science. It enables machines to become capable of doing those things which the human mind can do. Though the folklore of artificial intelligence dates back to a long time ago, it
Artificial Intelligence (AI) is the science and art of developing machines that simulate human intelligence. AI is frequently used for routine tasks that would normally involve human skills, such as visual perception, speech-recognition, and decision making. To me, Apple's Siri application is a good example of commonly-used AI technology. AI is particularly useful in the medical field, as it has allowed for better monitoring of patients combined with a more
Artificial Intelligence What if these theories are really true, and we were magically shrunk and put into someone's brain while he was thinking. We would see all the pumps, pistons, gears and levers working away, and we would be able to describe their workings completely, in mechanical terms, thereby completely describing the thought processes of the brain. But that description would nowhere contain any mention of thought! It would contain nothing
Artificial Intelligence and the Human Brain Although artificial intelligence is not a new debate topic, until now, there is no exact evidence that proves that scientists and philosophies have been reaching an agreement about the existence of this feature in our world. Scientists still claim that artificial intelligence is possible to achieve and the next technology advancement would be able to release the creation. On the other hand, many parties persist
Artificial Intelligence Bill of Rights This essay argues that the artificially intelligent (AI), non-biological machines correctly should have been granted legal status and personhood, and as such, were entitled to a Bill of Rights for their equal protection under the law. Passage of the AI Bill of Rights in 2015 represented a landmark victory in the history of civil rights. AIs had not been always recognized as legal persons. In fact, the
Most significantly, the use of LSI technologies to create more effective insights into how to improve customer service as evidenced by the use of AI was part of Decision Support Systems (DSS) (Phillips-Wren, Mora, Forgionne, Gupta, 2009) is growing. Second, the creation of ontological databases that aligns to person's roles (Pinto, Marques, Santos, 2009) is also now possible. This translates into the use of AI to provide contextual guidance
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now