Abstract
This chapter deals with the malicious use of AI and its implications for international psychological security. Two major challenges are related first to the malicious use of AI and its implications on international psychological security and second to malicious use of AI surveillance international relations. As concluded in this paper, optimal actions are needed in national and international levels to regulate AI but more AI surveillance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Carnegie Endowment for International Peace, AI surveillance technology, accessed at June 15, 2021. www.carnegieendowmen
Fernández-García, C.E., Marín, D.V., Velásquez, H.S. (2023). Neurohacking and Artificial Intelligence in the Vulnerability of the Human Brain: Are We Facing a Threat? In: Roumate, F. (eds) Artificial Intelligence in Higher Education and Scientific Research. Bridging Human and Machine: Future Education with Intelligence. Springer, Singapore. https://doi.org/10.1007/978-981-19-8641-3_9
Feldstein. S., (2019), The Global Expansion of AI Surveillance, Carnegie Endowment for International Peace. September 19. https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847
Kane, G.C (2017), ‘Digital Transformation’ Is a Misnomer: It’s not about digital or transformation. It’s about adaptation, MIT SLOAN Management Review. https://www.sloanreview.mit.edu/article/digital-transformation-is-a-misnomer/
Horowitz MC, Allen GC, Saravalle E, Cho A, Frederick K, Scharre P, Artificial Intelligence and International Security July 2018. https://s3.amazonaws.com/files.cnas.org/documents/CNAS-AI-and-International-Security-July-2018_Final.pdf?mtime=20180709122303
Sam Gregory, When Should We Share, Distressing Images? Seeing Aylan Kurdi, chapter in “The iconic image on social media: a rapid research response to the death of Aylan Kurdi” Visual Social Media Lab, December, 2015. https://research.gold.ac.uk/14624/1/KURDI%20REPORT.pdf
Samantha Cole, Deep Voice’ Software Can Clone Anyone’s Voice With Just 3.7 Seconds of Audio, Using snippets of voices, Baidu’s ‘Deep Voice’ can generate new speech, accents, and tones, Vice channel, 9 March 2018, 5:00 am https://www.vice.com/en_asia/article/3k799k/deep-voice-software-can-clone-anyones-voice-with-just-37-seconds-of-audio
Sayler, K. M. (2019), Artificial Intelligence and National Security, [online]. The report, https://crsreports.congress.gov R45178
Symantec, Internet security threat report, Volume 23, 2018. https://www.symantec.com/.../symantec/.../reports/istr-23-2018-en
United Nations, (2022), still sees no sign of biological weapons in Ukraine, 27 October.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Roumate, F. (2024). Malicious Use of Artificial Intelligence: New Challenges for International Psychological Security. In: Artificial Intelligence and the New World Order. Frontiers of Artificial Intelligence, Ethics and Multidisciplinary Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-50312-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-50312-2_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50311-5
Online ISBN: 978-3-031-50312-2
eBook Packages: Business and ManagementBusiness and Management (R0)