Open Access

Cybersecurity Education to Create Awareness in Artificial Intelligence Applications for Developers and End Users


Cite

Alani, M. M. (2017). Android users privacy awareness survey. International Journal of Interactive Mobile Technologies (IJIM), Vol. 11, Issue 3, 130-144.10.3991/ijim.v11i3.6605Search in Google Scholar

Alhazmi, O. H., Malaiya, Y. K., & Ray, I. (2007). Measuring, analyzing and predicting security vulnerabilities in software systems. Computers & security, Vol. 26, Issue 3, 219-228.10.1016/j.cose.2006.10.002Search in Google Scholar

Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2020). A survey on smartphone user’s security choices, awareness and education. Computers & Security, Vol. 88.10.1016/j.cose.2019.101647Search in Google Scholar

Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol. 35, Issue 2, 60-67.10.1177/0266382118773624Search in Google Scholar

Dawson, M., Burrell, D.N., Rahim, E., & Brewster, S. (2010). Integrating software assurance into the software development life cycle (SDLC). Journal of Information Systems Technology and Planning, Vol. 3, Issue 6, 49-53.Search in Google Scholar

Do, T. M. T., & Gatica-Perez, D. (2010). By their apps you shall understand them: mining large-scale patterns of mobile phone usage. Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia, 1-10.10.1145/1899475.1899502Search in Google Scholar

Federal Trade Commission v. CompuCredit Corporation and Jefferson Capital Systems, LLC. (2008). Complaint for Permanent Injunction and Other Equitable Relief, available at: https://www.ftc.gov/sites/default/files/documents/cases/2008/06/080610compucreditcmplt.pdf, accessed on 20 June 2020.Search in Google Scholar

Jeslet, D. S., Sivaraman, G., Uma, M., Thangadurai, K., & Punithavalli, M. (2010). Survey on awareness and security issues in password management strategies. International Journal of Computer Science and Network Security, Vol. 10, Issue 4, 19-23.Search in Google Scholar

Kumar, G., & Bhatia, P. K. (2014). Comparative analysis of software engineering models from traditional to modern methodologies. 4th International Conference on Advanced Computing & Communication Technologies, 189-196.10.1109/ACCT.2014.73Search in Google Scholar

Levin, S., & Woolf, N. (2016). Tesla driver killed while using autopilot was watching Harry Potter, witness says, available at: https://www.theguardian.com/technology/2016/jul/01/tesla-driver-killed-autopilot-self-driving-car-harry-potter, accessed on 20 June 2020.Search in Google Scholar

Paul, M. (2015). Official (ISC)2 Guide to the CSSLP. CRC Press.10.1201/b10978Search in Google Scholar

Potter, B., & McGraw, G. (2004). Software security testing. IEEE Security & Privacy, Vol. 2, Issue 5, 81-85.10.1109/MSP.2004.84Search in Google Scholar

Steinebach, M., & Waidner, M. (2018). Artificial Intelligence in IT Security. Whither Artificial Intelligence, 31-36.Search in Google Scholar

Tam, L., Glassman, M., & Vandenwauver, M. (2010). The psychology of password management: a tradeoff between security and convenience. Behaviour & Information Technology, Vol. 29, Issue 3, 233-244.10.1080/01449290903121386Search in Google Scholar

Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., & Barocas, S. (2010). Adnostic: Privacy preserving targeted advertising. Proceedings Network and Distributed System Symposium.Search in Google Scholar

Trieu, K., & Yang, Y. (2018). Artificial Intelligence-Based Password Brute Force Attacks. MWAIS Proceedings, Vol. 39.Search in Google Scholar

Yampolskiy, R. V., & Spellchecker, M. S. (2016). Artificial intelligence safety and cybersecurity: A timeline of AI failures, available at: https://arxiv.org/ftp/arxiv/papers/1610/1610.07997.pdf, accessed on 20 June 2020.Search in Google Scholar

eISSN:
2451-3148
ISSN:
1224-5178
Language:
English