Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity

This is a preview of subscription content, log in to check access.

Notes

  1. 1.

    https://www.microsoft.com/security/blog/2018/08/09/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks/.

  2. 2.

    AI as a form an autonomous, self-learning, interactive agency poses a plethora of ethical issues, that Luciano Floridi and I addressed here (Floridi and Taddeo 2016; Yang et al. 2018).

  3. 3.

    www.aitesting.org.

  4. 4.

    http://www.unbotify.com.

References

  1. Acalvio Autonomous Deception. (2019). Acalvio. https://www.acalvio.com/.

  2. Accenture. (2017). 2017 Cost of cyber crime study. Accenture. https://www.accenture.com/gb-en/insight-cost-of-cybercrime-2017.

  3. BehavioSec: Continuous Authentication Through Behavioral Biometrics. (2019). BehavioSec. https://www.behaviosec.com/.

  4. DarkLight Offers First of Its Kind Artificial Intelligence to Enhance Cybersecurity Defenses. (2017). 26 July 2017. https://www.businesswire.com/news/home/20170726005117/en/DarkLight-Offers-Kind-Artificial-Intelligence-Enhance-Cybersecurity.

  5. DeepLocker: How AI Can Power a Stealthy New Breed of Malware. (2018). Security intelligence (blog). 8 August 2018. https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/.

  6. Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083), 20160360. https://doi.org/10.1098/rsta.2016.0360.

    Article  Google Scholar 

  7. Mirsky, Y., Mahler, T., Shelef, I., & Elovici, Y. (2019). CT-GAN: Malicious tampering of 3D medical imagery using deep learning. ResearchGate. https://www.researchgate.net/publication/330357848_CT-GAN_Malicious_Tampering_of_3D_Medical_Imagery_using_Deep_Learning/figures?lo=1.

  8. Taddeo, M. (2012). An analysis for a just cyber warfare. In 2012 4th international conference on cyber conflict (CYCON 2012) (pp. 1–10).

  9. Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–356. https://doi.org/10.1007/s13347-013-0140-9.

    Article  Google Scholar 

  10. Taddeo, M. (2014a). Just information warfare. Topoi. https://doi.org/10.1007/s11245-014-9245-8.

    Google Scholar 

  11. Taddeo, M. (2014b). The struggle between liberties and authorities in the information age. Science and Engineering Ethics. https://doi.org/10.1007/s11948-014-9586-0.

    Google Scholar 

  12. Taddeo, M. (2017a). The limits of deterrence theory in cyberspace. Philosophy and Technology. https://doi.org/10.1007/s13347-017-0290-2.

    Google Scholar 

  13. Taddeo, M. (2017b). Deterrence by norms to stop interstate cyber attacks. Minds and Machines. https://doi.org/10.1007/s11023-017-9446-1.

    Google Scholar 

  14. Taddeo, M., & Floridi, L. (2018a). Regulate artificial intelligence to avert cyber arms race. Nature, 556(7701), 296–298. https://doi.org/10.1038/d41586-018-04602-6.

    Article  Google Scholar 

  15. Taddeo, M., & Floridi, L. (2018b). How AI can be a force for good. Science, 361(6404), 751–752. https://doi.org/10.1126/science.aat5991.

    MathSciNet  Article  Google Scholar 

  16. The 2019 Official Annual Cybercrime Report. (2019). Herjavec group. https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/.

  17. Yang, G.-Z., Bellingham, J., Dupont, P. E., Fischer, P., Floridi, L., Full, R., et al. (2018). The grand challenges of science robotics. Science Robotics, 3(14), 7650. https://doi.org/10.1126/scirobotics.aar7650.

    Article  Google Scholar 

  18. Zhuge, J., Holz, T., Han, X., Song, C., & Zou, W. (2007). Collecting autonomous spreading malware using high-interaction honeypots. In S. Qing, H. Imai, & G. Wang (Eds.), Information and communications security. Lecture notes in computer science (pp. 438–451). Berlin: Springer.

    Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Mariarosaria Taddeo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Taddeo, M. Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity. Minds & Machines 29, 187–191 (2019). https://doi.org/10.1007/s11023-019-09504-8

Download citation