Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

5. Discussion (Between 1400 to 1500 words) A. Interpretation of the results in light of the secondary research/literature review: Interprets the results in light of

5. Discussion (Between 1400 to 1500 words) A. Interpretation of the results in light of the secondary research/literature review: Interprets the results in light of the literature review, and discusses how they fit with or add to the existing body of knowledge. B. Discussion of the implications of the results for practice and future research: Discusses the implications of the results for practice, and suggests areas for future research. C. Discussion of the limitations of the study and suggestions for future research: Identifies the limitations of the study, and suggests areas for future research that could build on the current study. D. Conclusion and summary of the key findings and implications: Summarizes the key findings and implications of the study, and provides a conclusion to the report. .ASSIGNMENT 2 Research Problem and plan Topic Selection Balancing Security and Privacy: Ethical Considerations in AI-Driven Cybersecurity Research Problem - What are the privacy-preserving techniques that can be integrated into AI-powered cybersecurity solutions to protect user data while maintaining security? - What are the ethical and privacy implications of using AI-driven cybersecurity solutions, and how can these concerns be addressed in the design and deployment of such systems? - How can artificial intelligence be effectively integrated into existing cybersecurity frameworks to enhance threat detection and response mechanisms? Hypothesis The deployment of AI-driven cybersecurity solutions raises ethical and privacy concerns, including potential biases, data misuse, and user surveillance. Research Goal: Evaluate the Impact of AI on Cybersecurity Ethics Research Objective (s): To conduct secondary research. SMART Explain To conduct a focus session (5 people) To conduct online questionnaire survey Analyze data and synthesize the info Write research report Prepare a 15 min PPT presentation The Research Question What research question(s) do you have? Brainstorm and come up with new questions. What are the ethical implications of using AI in cybersecurity to monitor and protect digital assets and networks? Can AI be used to detect and mitigate security threats while minimizing the collection of personal data? How can organizations ensure that AI cybersecurity tools do not become tools for surveillance or data exploitation? How do users feel about AI monitoring and protection of their online activities? Keywords / Concepts What keyword searches are you using? Artificial Intelligence Cybersecurity Ethics Privacy Security Trust Systems Risk Data storage Security threats Development Technological advances Data security IoT Data Malware Network Security Attacks Data protection Intrusive uses Unauthorized Access Cybercrime Botnet Attacks CNN and LSTM models Cybercriminal Cybersecurity data Advanced AI methodologies Funding mechanisms Roadmap Systematic research programs Journal Articles (from Humber Library) Find 4 peer-reviewed journal articles that support and explore your research question Article Title: Artificial Intelligence Application in Cybersecurity and Cyberdefense Why do you like this article? The article provides a comprehensive overview of IoT technology, highlighting its transformative potential and the benefits it offers in various domains. Despite challenges such as security and compatibility, IoT remains a significant driver of innovation and societal progress, making it a focal point for researchers and businesses alike. APA citation for Article: Jun, Y., Craig, A., Shafik, W., & Sharif, L. (2021). Artificial Intelligence Application in Cybersecurity and Cyberdefense. Wireless Communications and Mobile Computing, 2021, 1-10. https://doi.org/10.1155/2021/3329581 https://humber.primo.exlibrisgroup.com/permalink/01OCLS_HUMB/hcldnn/cdi_crossref_primary_10_1155_2021_3329581 Article Title: Trusting artificial intelligence in cybersecurity is a double-edged sword Why do you like this article? It is interesting to see how the emergence of artificial intelligence is bringing significant technological advances. One of its most important applications is related to cybersecurity tasks. At the same time, since it is not a product that is 100% developed, there is a wide margin that makes this tool vulnerable. In this article, the authors talk about how artificial intelligence can improve cybersecurity practices, but it can also be susceptible to new forms of attacks, which by the very nature of artificial intelligence can be more difficult to detect and deal with. On the other hand, they also talk about efforts to create a form of control to generate a reliable use in cybersecurity issues. Finally, they offer three recommendations for the use of artificial intelligence in cybersecurity. APA citation for Article: Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557-560. https://doi.org/10.1038/s42256-019-0109-1 https://humber.primo.exlibrisgroup.com/permalink/01OCLS_HUMB/hcldnn/cdi_scopus_primary_2003635139 Article Title: The AI-Cybersecurity Nexus: The Good and the Evil Why do you like this article? The article gave valuable insights into the evolving landscape of AI's role in cybersecurity. It sheds light on the challenges and threats faced by organizations and individuals in the digital age. Given the rising importance of cybersecurity in our world, I appreciate the article's relevance in addressing real-world concerns. This article presents a balanced view of AI's role in cybersecurity, discussing its potential benefits for defense while also acknowledging the risks associated with offensive AI and adversarial attacks. In general, the article presented raises awareness about the significance of staying updated with evolving technologies and adopting new approaches to address emerging cybersecurity threats. APA citation for Article: Murugesan, S. (2022). The AI-Cybersecurity Nexus: The Good and the Evil. IT Professional, 24(5), 4-8. https://doi.org/10.1109/MITP.2022.3205529 Article Title: Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap Why do you like this article? This article is interesting because it focuses on the integration of artificial intelligence (AI) into cybersecurity, addressing contemporary challenges and proposing a roadmap for the studying field. Moreover, it highlights funding opportunities and introduces a special issue for further exploration, making it a valuable resource for those interested in the intersection of AI and cybersecurity. APA citation for Article: Samtani, S., Kantarcioglu, M., & Chen, H. (2020). Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap. ACM Transactions on Management Information Systems, 11(4), 1-19. https://doi.org/10.1145/3430360 https://humber.primo.exlibrisgroup.com/permalink/01OCLS_HUMB/hcldnn/cdi_crossref_primary_10_1145_3430360 Article Title: Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks Why do you like this article? I like the way article illustrates how artificial intelligence can be used to improve cybersecurity, but it also provides us with thorough information on the dangers, advantages, and framework associated with doing so.To minimize danger, we must be aware of what an AI is capable of and what are its limitations.I like how the framework breaks up the explanation to help us understand all of its components.I like how the essay uses the examples of Tesla, Air France Flight 447, the USS John S. McCain, and the chemical tanker MV ALNIC MC to demonstrate how, on occasion, improper coordination between humans and AI can result in serious problems. Lastly, I appreciated that the article included principals for cybersecurity in a society that is headed toward artificial intelligence. APA citation for Article: Kroll, J. A., Michael, J. B., & Thaw, D. B. (2021). Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks. Computer (Long Beach, Calif.), 54(6), 64-71. https://doi.org/10.1109/MC.2021.3055703 https://humber.primo.exlibrisgroup.com/permalink/01OCLS_HUMB/hcldnn/cdi_crossref_primary_10_1109_MC_2021_3055703 Article Title: Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics Why do you like this article? The rise of cybercrime, particularly botnet attacks, poses a significant global threat. Researchers are actively developing advanced detection techniques, including CNN and LSTM models, to combat evolving cybercriminal tactics and improve accuracy.ongoing efforts in cybersecurity and collaboration across sectors are essential to counter cybercrime and protect digital ecosystems. APA citation for Article: Djenna, A., Barka, E., Benchikh, A., & Khadir, K. (2023). Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics. Sensors (Basel, Switzerland), 23(14), 6302-. https://doi.org/10.3390/s23146302 https://humber.primo.exlibrisgroup.com/permalink/01OCLS_HUMB/hcldnn/cdi_proquest_miscellaneous_2844082974 Time Schedule / Project Plan Week What Needs to Be Done Due Date Who is responsible Note 4 Read Article 1 7/10/2023 Ghita DONE 4 Read Article 2 7/10/2023 Andres DONE 4 Read Article 3 7/10/2023 Geoff DONE 4 Read Article 4 7/10/2023 Max DONE 4 Read Article 5 7/10/2023 Armaan DONE 4 Read Article 6 7/10/2023 Ghita DONE 4 Submit Business Research Plan 08/10/2023 Max the coordinator :) DONE 5 Prepare focus group- In class Assignment #3 All members UPCOMING SOON 6 Research Questionnaire- Assignment #4 All members 9 Conduct Focus Group- Assignment All members 10-11 Double-checking of our work and preparation for final report All members 12 Final Written Report- Assignment #5 All members Group Presentation(13) Final Presentation- Assignment #6 All members Introduction Who is the client? What decision(s) do they need to make? What is the relevant information the reader needs to understand the problem? Situational Analysis: Include a brief business environment scan (PESTED+C) and first draft of a SWOT analysis. External Scan (include only things that are relevant) Political / Legal Economic Social / Cultural Technology Ecological Demographic Competition

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managerial Accounting

Authors: John J Wild, Ken W. Shaw, Barbara Chiappetta

7th edition

1260482936, 978-1260482935

More Books

Students also viewed these Accounting questions

Question

=+a) Which will be smoother, a 50-day or a 200-day moving average?

Answered: 1 week ago