Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity

This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which...

Full description

Saved in:  
Bibliographic Details
Main Author: Montasari, Reza (Author)
Format: Print Book
Language:English
Published: Cham Springer [2023]
In: Advances in information security (volume 101)
Year: 2023
Online Access: Cover (lizenzpflichtig)
Table of Contents
Check availability: HBZ Gateway
Book acquisition:Place book order
Subito Delivery Service: Order now.
Keywords:
Related Items:Erscheint auch als: 1830235044

MARC

LEADER 00000cam a2200000 4500
001 1830600486
003 DE-627
005 20230512121740.0
007 tu
008 230109s2023 xx ||||| 00| ||eng c
020 |a 9783031219191  |c Gebunden : EUR 158,30  |9 978-3-031-21919-1 
035 |a (DE-627)1830600486 
035 |a (DE-599)KXP1830600486 
035 |a (OCoLC)1357138017 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 363.325 
100 1 |a Montasari, Reza  |e VerfasserIn  |0 (DE-588)1273752279  |0 (DE-627)1823595820  |4 aut 
109 |a Montasari, Reza 
245 1 0 |a Countering cyberterrorism  |b the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity  |c Reza Montasari 
264 1 |a Cham  |b Springer  |c [2023] 
300 |a xv, 164 Seiten  |b Diagramme 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
490 1 |a Advances in information security  |v volume 101 
505 8 0 |a 1 Introduction References 2 Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom Abstract Introduction The Most Prevalent Cyber Threats The UK Cyber Landscape How Cyber Threats Are Identified in the UK Perpetrators of Cyber Threats Types of Cyber-Attacks The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies Current Policies, Strategies, and Practices National Cyber Security Centre Active Cyber Defence Programme National Cyber Security Strategy 2022-2030 Recommendations Criticisms of the NCSC and Recommendation Criticisms of the ACD and Recommendations Criticisms of the NCSS 2022-2030 and Recommendations Recommendations for the Government's Role Discussion and Conclusion Key Findings Limitations of the Chapter Concluding Remarks References 3 Internet of Things and Artificial Intelligence in National Security: Applications and Issues Abstract Introduction Background Definitions National and Domestic Security Definition of Artificial Intelligence The Internet of Things The Internet of Things Forensics AI and IoT in National and Domestic Security The Role of AI and IoT in Digital Security AI for Protecting IoT Devices against Hacking The Malicious Use of AI to Hack IoT Devices The Use of AI in the Military to Hack IoT Devices The Use of AI by Institutions to Safeguard Citizens AI and IoT in Political Security Deepfake and Mis- and Disinformation AI and the Formation of Filter Bubbles AI and Online Content Moderation AI and IoT in Physical Security Augmented Intelligence Analysis Military Weaponisation of AI and the IoT Privacy Implications of AI Algorithms Impacts of AI Algorithms on User Privacy Legal Frameworks for Privacy Relating AI Algorithms Potential Solutions for Privacy Implications Conclusion References 4 Artificial Intelligence and the Internet of Things Forensics in a National Security Context Abstract Introduction AI Techniques in Automating Tasks of IoT Forensics A Brief Summary of IoT Forensics from Chapter 3 Types of AI Techniques Relevant to IoT Forensics Natural Language Processing Machine Learning Machine Learning and Anomaly Detection Machine Learning and Detection of Steganography General Challenges of AI-Enabled IoT Forensics Sources and Detection of Algorithmic Bias Algorithmic Bias Sources of Algorithmic Bias Algorithmic Transparency and Military AI Risks of Increasing Transparency in Military AI Recommendations Recommendations for Detecting Algorithmic Bias Recommendations for Reducing Bias in Algorithms Recommendation for Algorithmic Transparency in Military AI Applications Conclusion References 5 The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing Abstract Introduction Key Concepts and History of AI Predictive Policing History of AI Facial Recognition Technology 3D Facial Recognition Machine Learning Supervised Learning Unsupervised Learning Reinforcement Learning Support Vector Machine Natural Language Processing Big Data RQ 1: The Use of AI by Law Enforcement I Big Data Predictive Analytics PredPol CompStat Person-Based Forecasting Innovative Surveillance Technology Hard and Soft Technology Closed-Circuit Television Facial Recognition Technology Body-Worn Cameras Social Media RQ 2: The Use of AI by Law Enforcement II ML and Data Mining in Policing Police Discrimination and Big Data DNA Databases and Big Data Recommendations Accountability and Tr 
520 |a This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state.This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges.Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book 
650 4 |a Artificial Intelligence 
650 4 |a COMPUTERS / Artificial Intelligence 
650 4 |a COMPUTERS / Networking / Security 
650 4 |a Computer- und Internetkriminalität 
650 4 |a Crime & criminology 
650 4 |a Künstliche Intelligenz 
650 4 |a Network security 
650 4 |a Netzwerksicherheit 
650 4 |a Social Science / Criminology 
776 1 |z 9783031219207 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |a Montasari, Reza  |t Countering cyberterrorism  |d Cham : Springer, 2023  |h 1 Online-Ressource (xv, 164 Seiten)  |w (DE-627)1830235044  |z 9783031219207 
830 0 |a Advances in information security  |v volume 101  |9 101  |w (DE-627)369918037  |w (DE-576)102677778  |w (DE-600)2120397-0  |x 1568-2633  |7 ns 
856 4 2 |u http://www.dietmardreier.de/annot/4B56696D677C7C39363135373030377C7C434F50.jpg?sq=5  |x Verlag  |z lizenzpflichtig  |3 Cover 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1830600486inh.htm  |m V:DE-576  |m B:DE-Frei85  |v 20230316133230  |3 Inhaltsverzeichnis 
935 |a mkri 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4255530327 
LOK |0 003 DE-627 
LOK |0 004 1830600486 
LOK |0 005 20230310113450 
LOK |0 008 230131||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a SA-MARC-krimdoka001.raw 
PDA |a yes