-
41
Countering cyberterrorism : the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity /
Published 2023Table of Contents: “…Introduction -- References -- Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom -- Abstract -- Introduction -- The Most Prevalent Cyber Threats -- The UK Cyber Landscape -- How Cyber Threats Are Identified in the UK Threats -- Types of Cyber-Attacks -- The UK Cybersecurity Policies and Practices Cybersecurity in Government Policies and Strategies -- Current Policies, Strategies, and Practices -- National Cyber Security Centre -- Active Cyber Defence Programme -- National Cyber Security Strategy 2022-2030 -- Recommendations -- Criticisms of the NCSC and Recommendations -- Criticisms of the ACD and Recommendations -- Criticisms of the NCSS 2022-2030 and Recommendations -- Recommendations for the Governments Role -- Discussion and Conclusion- Key Findings -- Limitations of the Chapter -- Concluding Remarks -- References -- Internet of Things and Artificial Intelligence in National Security: Applications and Issues -- Abstract -- Introduction -- Background -- Definitions -- National and Domestic Security -- Definition of Artificial Intelligence -- The Internet of Things -- The Internet of Things Forensics -- AI and IoT in National and Domestic Security -- The Role of AI and IoT in Digital Security -- AI for Protecting IoT Devices against Hacking -- The Malicious Use of AI to Hack IoT Devices -- The Use of AI in the Military to Hack IoT Devices. - The Use of AI by Institutions to Safeguard Citizens -- AI and IoT in Political Security -- Deepfake and Mis- and Disinformation -- AI and the Formation of Filter Bubbles -- AI and Online Content Moderation -- AI and IoT in Physical Security -- Augmented Intelligence Analysis -- Military Weaponisation of AI and the IoT -- Privacy Implications of AI Algorithms -- Impacts of AI Algorithms on User Privacy -- Legal Frameworks for Privacy Relating AI Algorithms -- Potential Solutions for Privacy Implications -- Conclusion -- References -- Artificial Intelligence and the Internet of Things -- Forensics in a National Security Context -- Abstract -- Introduction -- AI Techniques in Automating Tasks of IoT Forensics -- A Brief Summary of IoT Forensics from Chapter 3 -- Types of AI Techniques Relevant to IoT Forensics -- Natural Language Processing -- Machine Learning -- Machine Learning and Anomaly Detection -- Machine Learning and Detection of Steganography -- Machine Learning and Detection of Steganography -- Sources and Detection of Algorithmic Bias -- Algorithmic Bias -- Sources of Algorithmic Bias -- Algorithmic Transparency and Military AI -- Recommendations -- Recommendations for Detecting Algorithmic Bias -- Recommendation for Algorithmic Transparency in Military AI Applications -- Conclusion -- References -- The Application of Big Data Predictive Analytics and Surveillance Technologies in the Field of Policing -- Abstract -- Introduction -- Key Concepts and History of AI- Predictive Policing -- History of AI -- Facial Recognition Technology -- 3D Facial Recognition -- Machine Learning -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Support Vector Machine -- Natural Language Processing -- Big Data -- RQ 1: The Use of AI by Law Enforcement I -- Big Data Predictive Analytics -- PredPol -- CompStat -- Person-Based Forecasting -- Innovative Surveillance Technology -- Hard and Soft Technology -- Closed-Circuit Television -- Facial Recognition Technology -- Body-Worn Cameras -- Social Media -- RQ 2: The Use of AI by Law Enforcement II -- ML and Data Mining in Policing -- Police Discrimination and Big Data -- DNA Databases and Big Data -- Recommendations -- Accountability and Transparency -- Bias in ML Algorithms -- Conclusion -- References -- The Potential Impacts of the National Security Uses of Big Data Predictive Analytics on Human Rights -- Abstract -- Introduction -- Background -- Big Data Predictive Analytics -- The Application of Predictive Policing -- Civil Liberties and National Security -- RQ 1: The Use of AI by Law Enforcement I -- Civil Liberties and National Security -- Chilling Effect, Privacy Rights and Freedom of Speech -- The Fourth Amendment and Stop and Search -- Striking a Smart Balance -- RQ 2: The Use of AI by Law Enforcement II -- Overpolicing of Certain Areas -- Focus on Crimes of the Poor -- System Avoidance -- Recommendations -- Conclusion -- References -- National Artificial Intelligence Strategies: A Comparison of the UK, EU and US Approaches with Those Adopted by State Adversaries -- Abstract -- Introduction -- AI Strategies of the UK, EU and US -- The UK AI Strategy -- The EU AI Strategy -- AI Strategies of Russia and China -- The Chinese AI Strategy -- The Russian AI Strategy -- Shortcomings and Recommendations -- Shortcomings of the UK AI Strategy -- Shortcomings of the EU AI Strategy -- Shortcomings of the US AI Strategy -- Shortcomings of the Chinese AI Strategy -- Shortcomings of the Russian AI Strategy -- Conclusion -- References. .…”
Call Number:Located:Online Book -
42
Contemporary strategic Chinese American business negotiations and market entry /
Published 2023Call Number:Located:Online Book -
43
Blame and political attitudes the psychology of America's culture war /
Published 2023Call Number:Located:Online Book -
44
Asian American educators and microaggressions : more than just work(ers) /
Published 2023Call Number:Located:Online Book -
45
The rules of rescue : cost, distance, and effective altruism /
Published 2023Call Number:Located:Book -
46
Beauty and the brain : the science of human nature in early America /
Published 2023Call Number:Located:Online Book -
47
Mormon envoy : the diplomatic legacy of Dr. John Milton Bernhisel /
Published 2023Call Number:Located:Online Book -
48
Data cartels : the companies that control and monopolize our information /
Published 2023Call Number:Located:Online Book -
49
From Binghamton to the battlefield : the Civil War letters of Rollin B. Truesdell /
Published 2023“…United States History Civil War, 1861-1865 Personal narratives.…”
Call Number:Located:Book -
50
What is a criminal? : answers from inside the US justice system /
Published 2023Call Number:Located:
Online Book -
51
Fire and rain : Nixon, Kissinger, and the wars in Southeast Asia /
Published 2023Call Number:Located:Online Book -
52
Judgment and mercy : the turbulent life and times of the judge who condemned the Rosenbergs /
Published 2023Call Number:Located:Online Book -
53
A maverick Boasian : the life & work of Alexander A. Goldenweiser /
Published 2023Call Number:Located:Online Book -
54
How to end a war : essays on justice, peace, and repair /
Published 2023Call Number:Located:
Online Book -
55
American eloquence : language and leadership in the twentieth century /
Published 2023Call Number:Located:Online Book -
56
Case studies in applied behavior analysis for individuals with disabilities /
Published 2023Call Number:Located:Online Book -
57
Public-nonprofit collaboration and policy in homeless services : management, measurement, and impact /
Published 2023Subjects:Call Number:Located:Online Book -
58
-
59
-
60
Delivered under fire : Absalom Markland and freedom's mail /
Published 2023Call Number:Located:Online Book