Artificial intelligence security and its countermeasures Research Paper 2022
VerifiedAdded on 2022/08/16
|5
|2991
|15
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RESEARCH PAPER 0
Artificial Intelligence security
and its countermeasures
Artificial Intelligence security
and its countermeasures
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH PAPER 1
Abstract
Artificial intelligence is a leading technology that
helps companies to manage complex tasks effectively
and enhance the level of productivity. In this
generation, many business communities are using AI-
based networks for enhancing organizational
performance but they are also facing security risks
and threats. Security and privacy both are major
concerns linked with the AI technology that impact
on the privacy of data and lead hacking issues. This
proposed research focuses on the security issues of
AI technology and evaluated effective
countermeasures for enhancing the privacy of data.
There are various methodologies adopted including
qualitative design, inductive approach, content
analysis method and many more. The conducted
literature search helped to solve research questions
and obtain reliable information about artificial
intelligence security. It is found that a lack of
awareness and unauthorized networks are major
factors that lead to malware and DoS related attacks
in the AI networks. Therefore, it is suggested that
companies should implement firewall and encryption
based networks for protecting data against malware
signals and provide complete training to the
employees while using AI-based networks.
Keywords: artificial intelligence, security issues,
malware, firewall, and encryption.
1. INTRODUCTION
Artificial intelligence is defined as the simulation of
human intelligence in machines and computing
networks which are mainly developed and programs
to think like humans. The major point of artificial
intelligence is that it is capable to link human things
with computing devices. In this generation, the use of
AI technology is growing day by day and many
business communities are using this technology for
enhancing business performance and reducing
complexity. In terms of reliability, AI networks are
more effective that helps to complete the complex
tasks in less time. Bi, et al., (2019) examined that the
idea feature of AI technology is its capability to
rationalize and take actions that help to manage
complex tasks [1]. Security is a major concern linked
with the artificial intelligence that impacts on the
organizational performance.
This research will focus on AI security issues and
evaluate effective countermeasures for addressing
security problems. There are various methodologies
will be adopted
including design, research approach, data collection,
and data analysis methods.
1.1 RESEARCH QUESTIONS
What is the concept behind artificial
intelligence?
What are the security problems and
challenges that occur in AI technology?
Describe various countermeasures for
addressing security problems related to the
AI technology
1.2 RESEARCH OBJECTIVES
To enhance skills in the area of artificial
intelligence
To determine the key features of AI
technology
To identify security concerns related to
artificial intelligence
To report effective countermeasures against
security risks
2. ARTIFICIAL INTELLIGENCE
In this generation, most of the companies are moving
towards innovation and artificial intelligence is the
best technology for enhancing organizational
performance and solving complex tasks. Cath, et al.,
(2019) examined that AI technology is grounded on
the principle that human intelligence may be
designed in a way that a machine can effectively
manage tasks and provide reliable outcomes to the
management [2].
The utilization of AI-based networks can help
companies to reduce human errors and perform
business operations 24 hours. Machine learning is a
major part of the AI technology by which companies
can develop human-based robots for performing
numbers of tasks at a time. From the recent study, it
is examined that artificial intelligence is a branch of
computer science that is used to replace human
intelligence in computing networks and machines.
There are major three advantages of AI technology
due to which companies are adopting AI-based
networks including larger effectiveness, more reliable
and enhance organizational productivity. Security is
an essential part of the company and the utilization of
AI technology can lead to security threats and
problems in the companies due to which management
can lose the privacy of data. This research will help
to enhance the privacy of data towards artificial
Artificial intelligence security and its countermeasures
Abstract
Artificial intelligence is a leading technology that
helps companies to manage complex tasks effectively
and enhance the level of productivity. In this
generation, many business communities are using AI-
based networks for enhancing organizational
performance but they are also facing security risks
and threats. Security and privacy both are major
concerns linked with the AI technology that impact
on the privacy of data and lead hacking issues. This
proposed research focuses on the security issues of
AI technology and evaluated effective
countermeasures for enhancing the privacy of data.
There are various methodologies adopted including
qualitative design, inductive approach, content
analysis method and many more. The conducted
literature search helped to solve research questions
and obtain reliable information about artificial
intelligence security. It is found that a lack of
awareness and unauthorized networks are major
factors that lead to malware and DoS related attacks
in the AI networks. Therefore, it is suggested that
companies should implement firewall and encryption
based networks for protecting data against malware
signals and provide complete training to the
employees while using AI-based networks.
Keywords: artificial intelligence, security issues,
malware, firewall, and encryption.
1. INTRODUCTION
Artificial intelligence is defined as the simulation of
human intelligence in machines and computing
networks which are mainly developed and programs
to think like humans. The major point of artificial
intelligence is that it is capable to link human things
with computing devices. In this generation, the use of
AI technology is growing day by day and many
business communities are using this technology for
enhancing business performance and reducing
complexity. In terms of reliability, AI networks are
more effective that helps to complete the complex
tasks in less time. Bi, et al., (2019) examined that the
idea feature of AI technology is its capability to
rationalize and take actions that help to manage
complex tasks [1]. Security is a major concern linked
with the artificial intelligence that impacts on the
organizational performance.
This research will focus on AI security issues and
evaluate effective countermeasures for addressing
security problems. There are various methodologies
will be adopted
including design, research approach, data collection,
and data analysis methods.
1.1 RESEARCH QUESTIONS
What is the concept behind artificial
intelligence?
What are the security problems and
challenges that occur in AI technology?
Describe various countermeasures for
addressing security problems related to the
AI technology
1.2 RESEARCH OBJECTIVES
To enhance skills in the area of artificial
intelligence
To determine the key features of AI
technology
To identify security concerns related to
artificial intelligence
To report effective countermeasures against
security risks
2. ARTIFICIAL INTELLIGENCE
In this generation, most of the companies are moving
towards innovation and artificial intelligence is the
best technology for enhancing organizational
performance and solving complex tasks. Cath, et al.,
(2019) examined that AI technology is grounded on
the principle that human intelligence may be
designed in a way that a machine can effectively
manage tasks and provide reliable outcomes to the
management [2].
The utilization of AI-based networks can help
companies to reduce human errors and perform
business operations 24 hours. Machine learning is a
major part of the AI technology by which companies
can develop human-based robots for performing
numbers of tasks at a time. From the recent study, it
is examined that artificial intelligence is a branch of
computer science that is used to replace human
intelligence in computing networks and machines.
There are major three advantages of AI technology
due to which companies are adopting AI-based
networks including larger effectiveness, more reliable
and enhance organizational productivity. Security is
an essential part of the company and the utilization of
AI technology can lead to security threats and
problems in the companies due to which management
can lose the privacy of data. This research will help
to enhance the privacy of data towards artificial
Artificial intelligence security and its countermeasures
RESEARCH PAPER 2
intelligence and solve security-related concerns
effectively.
3. LITERATURE REVIEW
AI is a common area for the investigation and
numbers of articles were published in the last few
years where the researchers identified benefits and
challenges linked with artificial intelligence. The
significance of the literature search is to determine
the security risks and issues associated with AI
technology and evaluate the outcomes of the recent
studies grounded on the research topic.
3.1 ARTIFICIAL INTELLIGENCE
SECURITY
Čerka, Grigienė, and Sirbikytė, (2015) examined that
security is an essential part of AI technology where
the hackers transfer the unwanted signals that reduce
the privacy of data and produce privacy concerns [3].
In the companies, AI technology helps to perform
operations effectively but the presence of
unauthorized signals can break the privacy of data
and lead data breach issues.
There are major three factors that lead to privacy
issues in the area of artificial intelligence, for
example, lack of privacy, misconfiguration of servers
and unauthorized activities presented in the
computing devices. It is significant to use secured
networks as the criminal's transfer malware signals
by which the privacy of AI networks can be reduced
and the performance of the developed systems can be
decreased.
Guihot, Matthew, and Suzor, (2017) provided their
viewpoints and determined that AI technology is
helpful for enhancing the business process but it can
produce the risks and challenges where companies
can suffer from the data breach [4]. AI-based
networks use internet connection and communication
systems where the presence of unauthorized signals
can lead to cyber-crimes and reduce the privacy of
sensitive data. If the transmitted malware enters into
AI systems then companies can lose control from the
AI-based machines and networks and criminals can
perform tasks easily.
More than 45% of companies were suffered from
hacking and cyber-crimes while using artificial
intelligence. Therefore, it is significant to understand
the security challenges linked to artificial
intelligence. Gurkaynak, Yilmaz, and Haksever,
(2016) supported this argument and reported that lack
of awareness is a major problem with the companies
due to which employees can access unauthorized
networks and lose confidentiality of systems in the
AI [5]. There are various cyber-attacks occur in the
area of artificial intelligence including malware
signals, denial of service attack, phishing and many
more. In this paper, security risks are divided into
two parts including security problems and privacy
problems.
3.2 SECURITY PROBLEMS
Pan, (2016) determined that there are a number of
security risks or problems that occur in the AI
networks such as security threat of technology abuse,
induced by technical defects and many more [6]. It is
important to find the risk factors linked with AI
technology in order to defend cyber-crimes and risks
from the developed systems. From recent literature, it
is found that AI is a neutral technique that connects
numbers of technologies and computing devices to
each other for performing operations effectively.
Most of the companies suffer cyber-attacks due to
technology abuse where the criminals transfer
unwanted signals and impact on the developed
systems by which the sensitive data can be leaked.
Pesapane, et al., (2018) identified that criminals use
malicious programs for transferring fraud signals that
help to reduce the performance of the communication
channels and technologies used in the AI systems are
not able to detect unwanted signals by which hackers
can perform data breach [7].
Because of some technical defects, the AI networks
are not capable to protect data against cyber-crimes
and more than 34% of the companies are facing such
problems. Ransbotham, et al., (2017) supported the
argument and examined that lack of awareness is a
key problem where companies do not provide
complete training to the employees and hackers can
obtain login credentials of computing devices using
malicious programs [8].
3.3 PRIVACY PROBLEMS
According to Rehman, and Saba, (2014) the privacy
of artificial intelligence can be breached by blocking
communication channels and accessing private
networks of the companies [9]. In the area of
artificial intelligence, there are major three privacy
risks that occurred including confidentiality issues,
phishing, and unauthorized signals transferred by the
criminals. Therefore, it is significant to focus on
privacy while implementing AI networks in the
business and companies should ensure to use only
private networks rather than third parties.
intelligence and solve security-related concerns
effectively.
3. LITERATURE REVIEW
AI is a common area for the investigation and
numbers of articles were published in the last few
years where the researchers identified benefits and
challenges linked with artificial intelligence. The
significance of the literature search is to determine
the security risks and issues associated with AI
technology and evaluate the outcomes of the recent
studies grounded on the research topic.
3.1 ARTIFICIAL INTELLIGENCE
SECURITY
Čerka, Grigienė, and Sirbikytė, (2015) examined that
security is an essential part of AI technology where
the hackers transfer the unwanted signals that reduce
the privacy of data and produce privacy concerns [3].
In the companies, AI technology helps to perform
operations effectively but the presence of
unauthorized signals can break the privacy of data
and lead data breach issues.
There are major three factors that lead to privacy
issues in the area of artificial intelligence, for
example, lack of privacy, misconfiguration of servers
and unauthorized activities presented in the
computing devices. It is significant to use secured
networks as the criminal's transfer malware signals
by which the privacy of AI networks can be reduced
and the performance of the developed systems can be
decreased.
Guihot, Matthew, and Suzor, (2017) provided their
viewpoints and determined that AI technology is
helpful for enhancing the business process but it can
produce the risks and challenges where companies
can suffer from the data breach [4]. AI-based
networks use internet connection and communication
systems where the presence of unauthorized signals
can lead to cyber-crimes and reduce the privacy of
sensitive data. If the transmitted malware enters into
AI systems then companies can lose control from the
AI-based machines and networks and criminals can
perform tasks easily.
More than 45% of companies were suffered from
hacking and cyber-crimes while using artificial
intelligence. Therefore, it is significant to understand
the security challenges linked to artificial
intelligence. Gurkaynak, Yilmaz, and Haksever,
(2016) supported this argument and reported that lack
of awareness is a major problem with the companies
due to which employees can access unauthorized
networks and lose confidentiality of systems in the
AI [5]. There are various cyber-attacks occur in the
area of artificial intelligence including malware
signals, denial of service attack, phishing and many
more. In this paper, security risks are divided into
two parts including security problems and privacy
problems.
3.2 SECURITY PROBLEMS
Pan, (2016) determined that there are a number of
security risks or problems that occur in the AI
networks such as security threat of technology abuse,
induced by technical defects and many more [6]. It is
important to find the risk factors linked with AI
technology in order to defend cyber-crimes and risks
from the developed systems. From recent literature, it
is found that AI is a neutral technique that connects
numbers of technologies and computing devices to
each other for performing operations effectively.
Most of the companies suffer cyber-attacks due to
technology abuse where the criminals transfer
unwanted signals and impact on the developed
systems by which the sensitive data can be leaked.
Pesapane, et al., (2018) identified that criminals use
malicious programs for transferring fraud signals that
help to reduce the performance of the communication
channels and technologies used in the AI systems are
not able to detect unwanted signals by which hackers
can perform data breach [7].
Because of some technical defects, the AI networks
are not capable to protect data against cyber-crimes
and more than 34% of the companies are facing such
problems. Ransbotham, et al., (2017) supported the
argument and examined that lack of awareness is a
key problem where companies do not provide
complete training to the employees and hackers can
obtain login credentials of computing devices using
malicious programs [8].
3.3 PRIVACY PROBLEMS
According to Rehman, and Saba, (2014) the privacy
of artificial intelligence can be breached by blocking
communication channels and accessing private
networks of the companies [9]. In the area of
artificial intelligence, there are major three privacy
risks that occurred including confidentiality issues,
phishing, and unauthorized signals transferred by the
criminals. Therefore, it is significant to focus on
privacy while implementing AI networks in the
business and companies should ensure to use only
private networks rather than third parties.
RESEARCH PAPER 3
4. COUNTERMEASURES FOR
ARTIFICIAL INTELLIGENCE
SECURITY
There are following countermeasures and strategies
can be used for addressing security threats in
artificial intelligence:
Avoid unwanted and unauthorized signals
from the systems
Use only secure networks and secures
developed programs
Include effective security tools like firewall
and encryption for protecting data
Provide complete training to the employees
related to AI-based networks
Develop and implement privacy policies
Using anti-phishing techniques and tools
[10].
5. METHODOLOGY
5.1 RESEARCH APPROACH
It is a major part of the research that focuses on the
research quality and queries related to the research
topic. There are two approaches utilized including
inductive and deductive. Inductive is used to provide
depth information related to the research topic while
the deductive approach is used to provide brief
information in the investigations. In this study, the
inductive approach is used due to its capability to
deliver effective points related to artificial
intelligence security. With the help of such a
methodology, the research queries were solved
effectively which helped to obtain reliable facts
related to the research topic.
5.2 RESEARCH DESIGN
It is a helpful methodology that provides a platform
for completing the research in the right direction and
managing research issues effectively. Two types of
designs used in the research including qualitative and
quantitative. Russell, Dewey, and Tegmark, (2015)
examined that qualitative is used for gathering
theoretical facts but quantitative is used for obtaining
numerical data in the research [10]. In this research,
the qualitative design is adopted due to the subjective
nature of the research title and the ability to provide
depth information related to artificial intelligence
security. Using such a methodology the level of
research quality is enhanced and obtained appropriate
points.
5.3 DATA COLLECTION
There are two parts of data gathering methods
including primary and secondary. Scherer, (2015)
identified that the primary method provides fresh
information but the secondary method provides
reviewed information and facts in the research [11].
In this study, secondary methods are adopted for
gathering information about artificial intelligence.
For obtaining secondary data a literature review is
included that collected data from recent papers,
online websites, and books.
5.4 DATA ANALYSIS
In this investigation, the descriptive content
methodology is used for analyzing collected data due
to its potential to provide effective results and points
related to the research topic [12]. Moreover, Excel
software is used for representing collected data into
tabular and graphical forms. Therefore, using such
methods the developed research questions have been
solved and managed the flow of information.
6. RESULTS AND DISCUSSION
This proposed research provides information about
artificial intelligence and its security concerns faced
by the companies. It is found that AI is an effective
technology that helps companies to solve complex
tasks in a reliable manner. Security is a major
concern linked with the artificial intelligence
technology that helps criminals to obtain sensitive
data and access the computing devices of the
companies [13]. The conducted literature review
shows that lack of awareness is a key issue with the
employees due to which they can use unauthorized
networks in the computer systems and suffer from the
data breach issues.
It is found that the selected papers in the literature
search provided complete information related to
artificial intelligence security. The major part of
artificial intelligence is that it connects human things
with the machines by which the companies can
operate a number of tasks at a time [14]. Therefore, it
is significant for the companies to use appropriate
security tools while implementing artificial
intelligence in the workplace and aware employees
about the security attacks related to the computing
devices. It is found that there are three security
attacks that occur in the area of artificial intelligence
including malware, phishing, and denial of service
attack. This proposed research provided effective
countermeasures that can be used to address privacy
and security concerns linked with artificial
intelligence technology.
4. COUNTERMEASURES FOR
ARTIFICIAL INTELLIGENCE
SECURITY
There are following countermeasures and strategies
can be used for addressing security threats in
artificial intelligence:
Avoid unwanted and unauthorized signals
from the systems
Use only secure networks and secures
developed programs
Include effective security tools like firewall
and encryption for protecting data
Provide complete training to the employees
related to AI-based networks
Develop and implement privacy policies
Using anti-phishing techniques and tools
[10].
5. METHODOLOGY
5.1 RESEARCH APPROACH
It is a major part of the research that focuses on the
research quality and queries related to the research
topic. There are two approaches utilized including
inductive and deductive. Inductive is used to provide
depth information related to the research topic while
the deductive approach is used to provide brief
information in the investigations. In this study, the
inductive approach is used due to its capability to
deliver effective points related to artificial
intelligence security. With the help of such a
methodology, the research queries were solved
effectively which helped to obtain reliable facts
related to the research topic.
5.2 RESEARCH DESIGN
It is a helpful methodology that provides a platform
for completing the research in the right direction and
managing research issues effectively. Two types of
designs used in the research including qualitative and
quantitative. Russell, Dewey, and Tegmark, (2015)
examined that qualitative is used for gathering
theoretical facts but quantitative is used for obtaining
numerical data in the research [10]. In this research,
the qualitative design is adopted due to the subjective
nature of the research title and the ability to provide
depth information related to artificial intelligence
security. Using such a methodology the level of
research quality is enhanced and obtained appropriate
points.
5.3 DATA COLLECTION
There are two parts of data gathering methods
including primary and secondary. Scherer, (2015)
identified that the primary method provides fresh
information but the secondary method provides
reviewed information and facts in the research [11].
In this study, secondary methods are adopted for
gathering information about artificial intelligence.
For obtaining secondary data a literature review is
included that collected data from recent papers,
online websites, and books.
5.4 DATA ANALYSIS
In this investigation, the descriptive content
methodology is used for analyzing collected data due
to its potential to provide effective results and points
related to the research topic [12]. Moreover, Excel
software is used for representing collected data into
tabular and graphical forms. Therefore, using such
methods the developed research questions have been
solved and managed the flow of information.
6. RESULTS AND DISCUSSION
This proposed research provides information about
artificial intelligence and its security concerns faced
by the companies. It is found that AI is an effective
technology that helps companies to solve complex
tasks in a reliable manner. Security is a major
concern linked with the artificial intelligence
technology that helps criminals to obtain sensitive
data and access the computing devices of the
companies [13]. The conducted literature review
shows that lack of awareness is a key issue with the
employees due to which they can use unauthorized
networks in the computer systems and suffer from the
data breach issues.
It is found that the selected papers in the literature
search provided complete information related to
artificial intelligence security. The major part of
artificial intelligence is that it connects human things
with the machines by which the companies can
operate a number of tasks at a time [14]. Therefore, it
is significant for the companies to use appropriate
security tools while implementing artificial
intelligence in the workplace and aware employees
about the security attacks related to the computing
devices. It is found that there are three security
attacks that occur in the area of artificial intelligence
including malware, phishing, and denial of service
attack. This proposed research provided effective
countermeasures that can be used to address privacy
and security concerns linked with artificial
intelligence technology.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH PAPER 4
7. CONCLUSION
From the above discussion, it may be concluded that
security is a major problem linked with the AI
technology that helps criminals to perform data
breach and hacking activities in the companies. This
paper provided information about artificial
intelligence and examined the security problems
associated with AI technology. It is found that the
conducted literature search reviewed each and every
point related to the artificial intelligence security
attacks.
There are numerous attacks occur in AI technology
including malware, phishing, and DoS attack that
need to be addressed on the priority basis in order to
protect private details from the criminals. It is
determined that the utilization of firewall and
encryption methods can help the companies to protect
data against cyber-crimes and attacks. The company
should provide training to the employees by which
they can avoid the involvement of third-party
networks and unauthorized signals from the AI-based
systems. This proposed research provided a way
where readers can enhance skills in the area of
artificial intelligence and resolve the security
concerns in an appropriate manner.
8. REFERENCES
[1]. Bi, W.L., Hosny, A., Schabath, M.B., Giger,
M.L., Birkbak, N.J., Mehrtash, A., Allison,
T., Arnaout, O., Abbosh, C., Dunn, I.F. and
Mak, R.H., (2019) Artificial intelligence in
cancer imaging: clinical challenges and
applications. CA: a cancer journal for
clinicians, 69(2), pp.127-157.
[2]. Cath, C., Wachter, S., Mittelstadt, B.,
Taddeo, M. and Floridi, L., (2018) Artificial
Intelligence and the ‘Good Society’: the US,
EU, and UK approach. Science and
engineering ethics, 24(2), pp.505-528.
[3]. Čerka, P., Grigienė, J. and Sirbikytė, G.,
(2015) Liability for damages caused by
artificial intelligence. Computer Law &
Security Review, 31(3), pp.376-389.
[4]. Guihot, M., Matthew, A.F. and Suzor, N.P.,
(2017) Nudging robots: Innovative solutions
to regulate artificial intelligence. Vand. J.
Ent. & Tech. L., 20(6), p.385.
[5]. Gurkaynak, G., Yilmaz, I. and Haksever, G.,
(2016) Stifling artificial intelligence: Human
perils. Computer Law & Security
Review, 32(5), pp.749-758.
[6]. Pan, Y., (2016) Heading toward artificial
intelligence 2.0. Engineering, 2(4), pp.409-
413.
[7]. Pesapane, F., Volonté, C., Codari, M. and
Sardanelli, F., (2018) Artificial intelligence
as a medical device in radiology: ethical and
regulatory issues in Europe and the United
States. Insights into Imaging, 9(5), pp.745-
753.
[8]. Ransbotham, S., Kiron, D., Gerbert, P. and
Reeves, M., (2017) Reshaping business with
artificial intelligence: Closing the gap
between ambition and action. MIT Sloan
Management Review, 59(1), pp. 12-18.
[9]. Rehman, A. and Saba, T., (2014) Evaluation
of artificial intelligence techniques to secure
information in enterprises. Artificial
Intelligence Review, 42(4), pp.1029-1044.
[10]. Russell, S., Dewey, D. and
Tegmark, M., (2015) Research priorities for
robust and beneficial artificial
intelligence. Ai Magazine, 36(4), pp.105-
114.
[11]. Scherer, M.U., (2015) Regulating
artificial intelligence systems: Risks,
challenges, competencies, and
strategies. Harv. JL & Tech., 29(6), p.353.
[12]. Topol, E.J., (2019) High-
performance medicine: the convergence of
human and artificial intelligence. Nature
medicine, 25(1), pp.44-56.
[13]. Wahl, B., Cossy-Gantner, A.,
Germann, S. and Schwalbe, N.R., (2018)
Artificial intelligence (AI) and global health:
how can AI contribute to health in resource-
poor settings?. BMJ global health, 3(4),
p.e000798.
[14]. Wisskirchen, G., Biacabe, B.T.,
Bormann, U., Muntz, A., Niehaus, G., Soler,
G.J., and von Brauchitsch, B., (2017)
Artificial intelligence and robotics and their
impact on the workplace. IBA Global
Employment Institute, 12(6), pp.2012-2017.
7. CONCLUSION
From the above discussion, it may be concluded that
security is a major problem linked with the AI
technology that helps criminals to perform data
breach and hacking activities in the companies. This
paper provided information about artificial
intelligence and examined the security problems
associated with AI technology. It is found that the
conducted literature search reviewed each and every
point related to the artificial intelligence security
attacks.
There are numerous attacks occur in AI technology
including malware, phishing, and DoS attack that
need to be addressed on the priority basis in order to
protect private details from the criminals. It is
determined that the utilization of firewall and
encryption methods can help the companies to protect
data against cyber-crimes and attacks. The company
should provide training to the employees by which
they can avoid the involvement of third-party
networks and unauthorized signals from the AI-based
systems. This proposed research provided a way
where readers can enhance skills in the area of
artificial intelligence and resolve the security
concerns in an appropriate manner.
8. REFERENCES
[1]. Bi, W.L., Hosny, A., Schabath, M.B., Giger,
M.L., Birkbak, N.J., Mehrtash, A., Allison,
T., Arnaout, O., Abbosh, C., Dunn, I.F. and
Mak, R.H., (2019) Artificial intelligence in
cancer imaging: clinical challenges and
applications. CA: a cancer journal for
clinicians, 69(2), pp.127-157.
[2]. Cath, C., Wachter, S., Mittelstadt, B.,
Taddeo, M. and Floridi, L., (2018) Artificial
Intelligence and the ‘Good Society’: the US,
EU, and UK approach. Science and
engineering ethics, 24(2), pp.505-528.
[3]. Čerka, P., Grigienė, J. and Sirbikytė, G.,
(2015) Liability for damages caused by
artificial intelligence. Computer Law &
Security Review, 31(3), pp.376-389.
[4]. Guihot, M., Matthew, A.F. and Suzor, N.P.,
(2017) Nudging robots: Innovative solutions
to regulate artificial intelligence. Vand. J.
Ent. & Tech. L., 20(6), p.385.
[5]. Gurkaynak, G., Yilmaz, I. and Haksever, G.,
(2016) Stifling artificial intelligence: Human
perils. Computer Law & Security
Review, 32(5), pp.749-758.
[6]. Pan, Y., (2016) Heading toward artificial
intelligence 2.0. Engineering, 2(4), pp.409-
413.
[7]. Pesapane, F., Volonté, C., Codari, M. and
Sardanelli, F., (2018) Artificial intelligence
as a medical device in radiology: ethical and
regulatory issues in Europe and the United
States. Insights into Imaging, 9(5), pp.745-
753.
[8]. Ransbotham, S., Kiron, D., Gerbert, P. and
Reeves, M., (2017) Reshaping business with
artificial intelligence: Closing the gap
between ambition and action. MIT Sloan
Management Review, 59(1), pp. 12-18.
[9]. Rehman, A. and Saba, T., (2014) Evaluation
of artificial intelligence techniques to secure
information in enterprises. Artificial
Intelligence Review, 42(4), pp.1029-1044.
[10]. Russell, S., Dewey, D. and
Tegmark, M., (2015) Research priorities for
robust and beneficial artificial
intelligence. Ai Magazine, 36(4), pp.105-
114.
[11]. Scherer, M.U., (2015) Regulating
artificial intelligence systems: Risks,
challenges, competencies, and
strategies. Harv. JL & Tech., 29(6), p.353.
[12]. Topol, E.J., (2019) High-
performance medicine: the convergence of
human and artificial intelligence. Nature
medicine, 25(1), pp.44-56.
[13]. Wahl, B., Cossy-Gantner, A.,
Germann, S. and Schwalbe, N.R., (2018)
Artificial intelligence (AI) and global health:
how can AI contribute to health in resource-
poor settings?. BMJ global health, 3(4),
p.e000798.
[14]. Wisskirchen, G., Biacabe, B.T.,
Bormann, U., Muntz, A., Niehaus, G., Soler,
G.J., and von Brauchitsch, B., (2017)
Artificial intelligence and robotics and their
impact on the workplace. IBA Global
Employment Institute, 12(6), pp.2012-2017.
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.