Abstract
Computational Intelligence (CI) techniques have been widely used in the domains of computer security and computer forensics. One problem that normative discussions of technologies face is that the technical capabilities under investigation tend to be unclear and that the experts in normative questions do not tend to be experts in technical developments and vice versa. The present paper therefore sets out to chart the ethical and legal problems arising from a new and fast moving field, namely that of computational intelligence and its application to computer security and forensics. Using artificial neural networks (ANNs) as an example of computational intelligence, the paper’s main aim is to create a link between what can now be perceived as technical developments and established discourses in ethics and the law. It aims to chart the territory to highlight likely ethical and legal problems related to ANNs and point in the direction of future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
DFWRS, A road map for digital forensics research. Digital Forensics Re-search Workshop (August 2001), http://www.dfrws.org/2001/dfrws-rm-final.pdf
Pachghare, V.K., Kulkarni, P., Nikam, D.M.: Intrusion Detection System using Self Organizing Maps. In: International Conference on Intelligent Agent & Multimedia-Agent Systems, IAMA (2009)
Salvador, P., et al.: Framework for Zombie Detection Using Neural Networks. In: Fourth International Conference on Internet Monitoring and Protection, ICIMP (2009)
Wei, P., Zhang, W., Yang, H., Huang, S.: Combining neural networks and chaotic map to construct blind digital watermarking scheme. In: Proceeding of the Sixth International Conference on Intelligent Systems Design and Applications, ISDA (2006)
Lafferty, P., Ahmed, F.: Texture based steganalysis: results for color images. In: Mathematics of Data/Image Coding. Compression and Encryption VII. The Catholic University of America, 620 Michigan Avenue, NE, Washington DC, (2006)
Ciaramella, A., D’Arco, P., De Santis, A., et al.: Neural Network Techniques for proac-tive passwords checking. IEEE Transactions on Dependable and Secure Computing 3(4), 327–339 (2006)
Wang, S., Wang, H.: Password authentication using Hopfield neural networks. IEEE Transactions on Systems Man and Cybernetics – Part C: Applications and Reviews 38(2), 265–268 (2008)
Fei, B.K.L., Eloff, J.H.P., Olivier, M.S., Venter, H.: The use of self-organizing maps of anomalous behaviour detection in a digital investigation. Forensic Science International 162, 33–37 (2006)
Beebe, N.L., Clark, J.: Digital Forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results. Digital Investigation 4S, S49–S54 (2007)
Chen, H., Huang, S., Kuo, C.: Using the artificial neural networks to predict fraud litigation: Some empirical evidence from emerging markets. Expert Systems with Applications 36, 1478–1484 (2009)
McClelland, J., Rumelhart, D.E.: And The PDP Research group, Parallel distributed processing: explorations in the microstructure of cognition. Foundations I (1986A)
McClelland, J., Rumelhart, D.E.: And The PDP Research group, Parallel distributed processing: explorations in the microstructure of cognition. Psychological and Biological Models ll (1986B)
Quinn, M.J.: Ethics for the Information Age, 2nd edn. Pearson International Edition (2006)
Floridi, L. (ed.): The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press (2010)
Himma, K.E., Tavani, H.T. (eds.): The Handbook of Information and Computer Ethics. Wiley, Hoboken (2008)
Hoven, J.V.D., Weckert, J. (eds.): Information Technology and Moral Philosophy. Cambridge University Press, Cambridge (2008)
Brown, W.S.: Ontological Security, Existential Anxiety and Workplace Privacy. Journal of Business Ethics 23(1), 61–65 (2000)
Conger, S., Landry, B.J.: The Intersection of Privacy and Security. Presented at the Association of Information Systems SIGSEC Workshop on Information Security & Privacy (WISP 2008), Paris (2008)
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., Vance, A.: What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems 18(2), 126–139 (2009)
Lyon, D.: Surveillance society: Monitoring everyday life. Open University Press (2001)
Introna, L.D.: Workplace Surveillance ‘is’ Unethical and Unfair [Opin-ion]. Surveillance & Society 1(2), 210–216 (2003)
Stahl, B.C.: Forensic Computing in the Workplace: Hegemony, Ideology, and the Perfect Panopticon? Journal of Workplace Rights 13(2), 167–183 (2008)
Wiener, N.: The human use of human beings. Doubleday (1954)
Weizenbaum, J.: Computer Power and Human Reason. W. H. Freeman and Company, San Francisco (1976)
Introna, L.D., Wood, D.: Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. In: Norris, McCahill, Wood (eds.) Surveillance and Society CCTV Special, vol. 2(2/3) (2004)
Peisert, S., Bishop, M.: Computer Forensics In Forensis (2007), http://www.cs.ucdavis.edu/~peisert/research/2008-SADFE-ForensicsInForensis-PBM.pdf
Jansen, W., Delaitre, A.: NIST, Mobile Forensic Reference Materials: A Methodology and Reifica-tion (2009)
Hu, V.C., et al.: NIST, Interagency Report 7316 Access to Access Control Systems (2006), http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf
NIST Homepage, http://www.necam.com/IDS/Validation/
NEC Corporation of America (2011), NIST Validation, http://www.necam.com/IDS/Validation/
Sommer, P.: Scientific, Technological and Expert Evidence in Law and Legal Proceedings. In: Artificial Intelligence and Forensic Computing Workshop (2009), http://www.ktn.qinetiq-tim.net/content/files/groups/aiforensics/2009-04-02_PeterSommer.pdf
Robinson, et al: (RAND) Review of Data Protection Directive: Summary prepared for the Information Commisioner’s (2009), http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/review_of_eu_dp_directive_summary.pdf
Delacroix, S.: You’d better be committed: legal norms and normativity. American Journal of Jurisprudence (December 2009)
Gardner, J.: Nearly natural law. American Journal of Jurisprudence 52(1), 1–24 (2007)
Carley, K.: Dynamic Network Analysis in Counterterrorism Research. In: Proceedings of a Workshop on Statistics on Networks, Board of Mathematical Sciences (2007), http://books.nap.edu/openbook.php?record_id=12083&page=169
Carley, K., Behrman, R.: Social Network Influences on Strategic Choices (2004), http://www.casos.cs.cmu.edu/publications/papers/behrman_2004_socialnetworkinfluences.pdf
Hurwitz, E., Marwala, T.: State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation (2009)
Kasabov, N.: Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering. The MIT Press Cambridge, Massachusetts (1998)
Kenneally, E.: Gatekeeping Out Of The Box: Open Source Software As A Mechanism To Assess Reliability For Digital Evidence. Virginia Journal of Law and Technology (Fall 2001), http://www.vjolt.net/vol6/issue3/v6i3-a13-Kenneally.html
Krieger, C.: Neural Networks in Data Mining (1996), http://www.cs.uml.edu/~ckrieger/user/Neural_Networks.pdf (retrieved on June 28, 2010)
Cavoukian, A.: Privacy in the clouds. Identity in Information Society (1), 89–108 (2008)
Gill, S.: AI & Society 22, 265–270 (2008), http://people.na.infn.it/~tamburrini/pub/Guest%20editorial.pdf
Kosko, Bart: Neural Networks and Fuzzy Systems. Prentice Hall, New Jersey (1992)
Carroll-Mayer, M., Fairweather, B., Carsten Stahl, B.: CCTV Identity Management and Implications for Criminal Justice. Some Considerations in Surveillance and Society 5(1), 33–50 (2008) http://surveillance-and-society.org/articles/identity.pdf
Salmon, F., Stokes, J.: Algorithms Take Control of Wall Street. In: WIRED (January 2011)
Al-Zarouni, M.: Mobile Handset Forensic Evidence. A Challenge to Law Enforcement (2006)
Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics (2006), http://csrc.nist.gov/publications/drafts/DraftSP800101
Shirk, E.: The Dangers of Do-It-Yourself Computer Forensics. In: Law Practice Today, The American Bar Association (2007)
Carroll, O. (2008) Computer Forensics: Digital Forensics Analysis and Methodology, US Attorneys’ Bulletin (January 2007)
Vacca, J.: Computer Forensics: Computer Crime Scene Investigation, vol. 1. Charles River Media (2005)
Bainbridge, D.: Intellectual Property. Pearson (2009)
Omenn, G.: Enhancing the Role of the Scientific Expert Witness 102(8) (August 1994)
Bharadwaj, A.: Integrating Positivist and Interpretive Approaches to IS Research (2005)
Stephen, B.: Review of The Diffusion of Military Technology and Ideas. In: Goldman, E., Eliason, L. (eds.) Perspectives on Politics, vol. 3(3). Stanford University Press, Stanford (2004)
Leveson, L.J.: Expert Evidence in Criminal Courts. The Problem (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Stahl, B., Carroll-Mayer, M., Elizondo, D., Wakunuma, K., Zheng, Y. (2012). Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-25237-2_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25236-5
Online ISBN: 978-3-642-25237-2
eBook Packages: EngineeringEngineering (R0)