Have a personal or library account? Click to login
Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users Cover

Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users

Open Access
|Dec 2020

References

  1. Alani, M. M. (2017). Android users privacy awareness survey. International Journal of Interactive Mobile Technologies (IJIM), Vol. 11, Issue 3, 130-144.10.3991/ijim.v11i3.6605
  2. Alhazmi, O. H., Malaiya, Y. K., & Ray, I. (2007). Measuring, analyzing and predicting security vulnerabilities in software systems. Computers & security, Vol. 26, Issue 3, 219-228.10.1016/j.cose.2006.10.002
  3. Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2020). A survey on smartphone user’s security choices, awareness and education. Computers & Security, Vol. 88.10.1016/j.cose.2019.101647
  4. Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol. 35, Issue 2, 60-67.10.1177/0266382118773624
  5. Dawson, M., Burrell, D.N., Rahim, E., & Brewster, S. (2010). Integrating software assurance into the software development life cycle (SDLC). Journal of Information Systems Technology and Planning, Vol. 3, Issue 6, 49-53.
  6. Do, T. M. T., & Gatica-Perez, D. (2010). By their apps you shall understand them: mining large-scale patterns of mobile phone usage. Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia, 1-10.10.1145/1899475.1899502
  7. Federal Trade Commission v. CompuCredit Corporation and Jefferson Capital Systems, LLC. (2008). Complaint for Permanent Injunction and Other Equitable Relief, available at: https://www.ftc.gov/sites/default/files/documents/cases/2008/06/080610compucreditcmplt.pdf, accessed on 20 June 2020.
  8. Jeslet, D. S., Sivaraman, G., Uma, M., Thangadurai, K., & Punithavalli, M. (2010). Survey on awareness and security issues in password management strategies. International Journal of Computer Science and Network Security, Vol. 10, Issue 4, 19-23.
  9. Kumar, G., & Bhatia, P. K. (2014). Comparative analysis of software engineering models from traditional to modern methodologies. 4th International Conference on Advanced Computing & Communication Technologies, 189-196.10.1109/ACCT.2014.73
  10. Levin, S., & Woolf, N. (2016). Tesla driver killed while using autopilot was watching Harry Potter, witness says, available at: https://www.theguardian.com/technology/2016/jul/01/tesla-driver-killed-autopilot-self-driving-car-harry-potter, accessed on 20 June 2020.
  11. Paul, M. (2015). Official (ISC)2 Guide to the CSSLP. CRC Press.10.1201/b10978
  12. Potter, B., & McGraw, G. (2004). Software security testing. IEEE Security & Privacy, Vol. 2, Issue 5, 81-85.10.1109/MSP.2004.84
  13. Steinebach, M., & Waidner, M. (2018). Artificial Intelligence in IT Security. Whither Artificial Intelligence, 31-36.10.1109/IC-AIAI.2018.8674444
  14. Tam, L., Glassman, M., & Vandenwauver, M. (2010). The psychology of password management: a tradeoff between security and convenience. Behaviour & Information Technology, Vol. 29, Issue 3, 233-244.10.1080/01449290903121386
  15. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., & Barocas, S. (2010). Adnostic: Privacy preserving targeted advertising. Proceedings Network and Distributed System Symposium.
  16. Trieu, K., & Yang, Y. (2018). Artificial Intelligence-Based Password Brute Force Attacks. MWAIS Proceedings, Vol. 39.
  17. Yampolskiy, R. V., & Spellchecker, M. S. (2016). Artificial intelligence safety and cybersecurity: A timeline of AI failures, available at: https://arxiv.org/ftp/arxiv/papers/1610/1610.07997.pdf, accessed on 20 June 2020.
DOI: https://doi.org/10.2478/bsaft-2020-0012 | Journal eISSN: 3100-5098 | Journal ISSN: 3100-508X
Language: English
Page range: 85 - 92
Published on: Dec 17, 2020
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2020 Maurice Dawson, Annamaria Szakonyi, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.