Using Artificial Intelligence (AI) and Machine Learning (ML) to Disrupt the Negative Impact of Disinformation on Digital Sovereignty and Social Stability Through Cognitive Security in Elections

Authors

Joseph Squillace
Penn State University
Justice Cappella
Penn State University

Keywords:

Artificial Intelligence, Cybersecurity, Election Integrity, Data Protection

Synopsis

This is a Chapter in:

Book:
Competitive Tools, Techniques, and Methods

Print ISBN 978-1-6692-0008-6
Online ISBN 978-1-6692-0007-9

 

Series:
Chronicle of Computing

Chapter Abstract:

Artificial Intelligence (AI) and Machine Learning (ML) stand at the forefront of election security. However, the rapid ascension of AI and ML as future tenets of modern election integrity have required these resources be protected to safeguard democracy from disinformation, misinformation, and media manipulation; securing tomorrow by protecting technology today.

 

Cite this paper as:

Squillace J., Cappella J. (2024) Using Artificial Intelligence (AI) and Machine Learning (ML) to Disrupt the Negative Impact of Disinformation on Digital Sovereignty and Social Stability Through Cognitive Security in Elections .
In: Tiako P.F. (ed) Competitive Tools, Techniques, and Methods. Chronicle of Computing. OkIP. CAIF24#17. https://doi.org/10.55432/978-1-6692-0007-9_6


Presented at:
The 2024 OkIP International Conference on Artificial Intelligence Frontiers (CAIF) in Oklahoma City, Oklahoma, USA, and Online, on April 3, 2024

Contact:
Joseph Squillace
jms10943@psu.edu

References

Alawida, M., Shawar, B. A., Abiodun, O. I., Mehmood, A., & Omolara, A. E. (2023). “Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness.” Preprint (non-peer reviewed version)

Bishop, M. (2006) "Pattern recognition and machine learning," Springer, 2006.

Chatzoglou, E., Karopoulos, G., Kambourakis, G., & Tsiatsikas, Z. (2023). “Bypassing antivirus detection: old-school malware, new tricks.” Preprint (non-peer reviewed version)

Hariri, W. (2023). “Unlocking the Potential of ChatGPT: A Comprehensive Exploration of its Applications, Advantages, Limitations, and Future Directions in Natural Language Processing.” Preprint (non-peer reviewed version)

Jain, A.K., Ross, A., Prabhakar, S. (2004). “An introduction to biometric recognition," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. (1), pp. 4-20.

Jajodia, S., Liu, P., Swarup, V., Wang, C., and Wang, X. (2018). “Cybersecurity and supply chain management: Challenges and research opportunities," IEEE Security & Privacy, Vol. 16, No. (4), pp. 38-47.

Keromytis, A. D., and Stolfo, S. J. (2003). "Securing the supply chain," IEEE Security & Privacy, Vol. 1, No. 4, pp. 15-24.

Kanhere, S.S. and Zaveri, M. J. (2020). “A survey of security issues in machine learning," IEEE Communications Surveys & Tutorials, Vol. 22, No. 4, pp. 2751-2771.

McEvily, A. K. (1998). "The dark side of trust: When trust becomes a liability," Academy of Management Review, Vol. 23, No. 3, pp. 459-472.

Narayanan, A. and Shmatikov, V. (2008). "How to break anonymity of the Netflix prize dataset," ACM Conference on Computer and Communications Security, pp. 167-178.

Narayanan, A. and V. Shmatikov, V. (2009). “De-anonymizing social networks,” ACM Conference on Computer and Communications Security, pp. 173-182.

Narayanan, A. and Shmatikov, V. (2010). “Myths and fallacies of "personally identifiable Information,” Communications of the ACM, vol. 53, no. 6, pp. 24-26.

Roy, S. S., Naragam, K. V., & Nilizadeh, S. (2023). “Generating Phishing Attacks using ChatGPT.” Preprint (non-peer reviewed version).

Using Artificial Intelligence (AI) and Machine Learning (ML) to Disrupt the Negative Impact of Disinformation on Digital Sovereignty and Social Stability Through Cognitive Security in Elections

Published

August 21, 2024

Online ISSN

2831-350X

Print ISSN

2831-3496