Using Artificial Intelligence (AI) and Machine Learning (ML) to Disrupt the Negative Impact of Disinformation on Digital Sovereignty and Social Stability Through Cognitive Security in Elections
Keywords:
Artificial Intelligence, Cybersecurity, Election Integrity, Data ProtectionSynopsis
This is a Chapter in:
Book:
Competitive Tools, Techniques, and Methods
Print ISBN 978-1-6692-0008-6
Online ISBN 978-1-6692-0007-9
Series:
Chronicle of Computing
Chapter Abstract:
Artificial Intelligence (AI) and Machine Learning (ML) stand at the forefront of election security. However, the rapid ascension of AI and ML as future tenets of modern election integrity have required these resources be protected to safeguard democracy from disinformation, misinformation, and media manipulation; securing tomorrow by protecting technology today.
Cite this paper as:
Squillace J., Cappella J. (2024) Using Artificial Intelligence (AI) and Machine Learning (ML) to Disrupt the Negative Impact of Disinformation on Digital Sovereignty and Social Stability Through Cognitive Security in Elections .
In: Tiako P.F. (ed) Competitive Tools, Techniques, and Methods. Chronicle of Computing. OkIP. CAIF24#17. https://doi.org/10.55432/978-1-6692-0007-9_6
Presented at:
The 2024 OkIP International Conference on Artificial Intelligence Frontiers (CAIF) in Oklahoma City, Oklahoma, USA, and Online, on April 3, 2024
Contact:
Joseph Squillace
jms10943@psu.edu
References
Alawida, M., Shawar, B. A., Abiodun, O. I., Mehmood, A., & Omolara, A. E. (2023). “Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness.” Preprint (non-peer reviewed version)
Bishop, M. (2006) "Pattern recognition and machine learning," Springer, 2006.
Chatzoglou, E., Karopoulos, G., Kambourakis, G., & Tsiatsikas, Z. (2023). “Bypassing antivirus detection: old-school malware, new tricks.” Preprint (non-peer reviewed version)
Hariri, W. (2023). “Unlocking the Potential of ChatGPT: A Comprehensive Exploration of its Applications, Advantages, Limitations, and Future Directions in Natural Language Processing.” Preprint (non-peer reviewed version)
Jain, A.K., Ross, A., Prabhakar, S. (2004). “An introduction to biometric recognition," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. (1), pp. 4-20.
Jajodia, S., Liu, P., Swarup, V., Wang, C., and Wang, X. (2018). “Cybersecurity and supply chain management: Challenges and research opportunities," IEEE Security & Privacy, Vol. 16, No. (4), pp. 38-47.
Keromytis, A. D., and Stolfo, S. J. (2003). "Securing the supply chain," IEEE Security & Privacy, Vol. 1, No. 4, pp. 15-24.
Kanhere, S.S. and Zaveri, M. J. (2020). “A survey of security issues in machine learning," IEEE Communications Surveys & Tutorials, Vol. 22, No. 4, pp. 2751-2771.
McEvily, A. K. (1998). "The dark side of trust: When trust becomes a liability," Academy of Management Review, Vol. 23, No. 3, pp. 459-472.
Narayanan, A. and Shmatikov, V. (2008). "How to break anonymity of the Netflix prize dataset," ACM Conference on Computer and Communications Security, pp. 167-178.
Narayanan, A. and V. Shmatikov, V. (2009). “De-anonymizing social networks,” ACM Conference on Computer and Communications Security, pp. 173-182.
Narayanan, A. and Shmatikov, V. (2010). “Myths and fallacies of "personally identifiable Information,” Communications of the ACM, vol. 53, no. 6, pp. 24-26.
Roy, S. S., Naragam, K. V., & Nilizadeh, S. (2023). “Generating Phishing Attacks using ChatGPT.” Preprint (non-peer reviewed version).