2020
DOI: 10.1007/s42452-020-03559-4
|View full text |Cite
|
Sign up to set email alerts
|

Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge

Abstract: We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improving organisational resilience and understanding cyber risk. The research is focused on identifying the role of AI in connected devices such as Internet of Things (IoT) devices. Through literature review, we identify wide ranging and creative methodologies for cyber analytics and explore the risks of deliberately influencing or disrupting behaviours to socio-technical systems. This res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 51 publications
(30 citation statements)
references
References 54 publications
1
29
0
Order By: Relevance
“…Risk assessment is already a well-defined process, and broadly involves (1) risk analysis – identifying and analysing future negative events; and (2) risk evaluation – predicting the tolerability of such negative events, as subsets of risk management [ 5 ]. Although risk assessment is a well-studied process, current risk assessment approaches are inadequate for IoT [ 6 ], because of the periodic assumptions that systems will stay the same, and in IoT systems with changing boundaries, high risks can be missed or mistaken. The risk from IoT technology is also changing how supply chain operations are structured.…”
Section: Introductionmentioning
confidence: 99%
“…Risk assessment is already a well-defined process, and broadly involves (1) risk analysis – identifying and analysing future negative events; and (2) risk evaluation – predicting the tolerability of such negative events, as subsets of risk management [ 5 ]. Although risk assessment is a well-studied process, current risk assessment approaches are inadequate for IoT [ 6 ], because of the periodic assumptions that systems will stay the same, and in IoT systems with changing boundaries, high risks can be missed or mistaken. The risk from IoT technology is also changing how supply chain operations are structured.…”
Section: Introductionmentioning
confidence: 99%
“…Online media are expected to be a significant source of revenue in the coming years (Liu and Peng, 2017). In contrast, livestream sports platforms face cyber risk, such data risk, cyber-crime and human error (Radanliev et al, 2020;Sheehan et al, 2021). To improve the experience of watching the sports events on the network platform, the online sports streaming medias adopt artificial intelligence technology, but it neglects the security of users' data and aggravate the cyber risk, which can easily lead to the leakage of users' data (Radanliev et al, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, livestream sports platforms face cyber risk, such data risk, cyber-crime and human error (Radanliev et al, 2020;Sheehan et al, 2021). To improve the experience of watching the sports events on the network platform, the online sports streaming medias adopt artificial intelligence technology, but it neglects the security of users' data and aggravate the cyber risk, which can easily lead to the leakage of users' data (Radanliev et al, 2020). Moreover, owing to the anonymity of the "bullet screen" service of the online sports streaming media, cyber-criminal organizations use the "bullet screen" to induce users to illegal websites, resulting in users' financial losses.…”
Section: Introductionmentioning
confidence: 99%
“…The consequences of cyber-attacks are often borderless and expand to societies. Recent research in cybersecurity put forward a diversity of areas to investigate, such as: transportation [4,5], IoT, CPS [6,7], and healthcare [8,9]. Nevertheless, due to the ever-changing nature of cyber-risks, and with the continual inclusion of new assets, organizations need a holistic and persistent approach to cybersecurity.…”
Section: Introductionmentioning
confidence: 99%