Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (5)
- Engineering (5)
- Social and Behavioral Sciences (5)
- Library and Information Science (4)
- Databases and Information Systems (3)
-
- Scholarly Communication (3)
- Science and Technology Studies (3)
- Software Engineering (3)
- Archival Science (2)
- Artificial Intelligence and Robotics (2)
- Computational Linguistics (2)
- Digital Communications and Networking (2)
- Information Literacy (2)
- Infrastructure (2)
- Linguistics (2)
- Public Affairs, Public Policy and Public Administration (2)
- Scholarly Publishing (2)
- Science and Technology Policy (2)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Anatomy (1)
- Applied Behavior Analysis (1)
- Applied Mathematics (1)
- Business (1)
- Business Administration, Management, and Operations (1)
- Business Intelligence (1)
- Cataloging and Metadata (1)
- Chemistry (1)
- Keyword
-
- Android (3)
- Security (3)
- Machine Learning (2)
- Artificial Intelligence (AI) (1)
- Benefits of AI (1)
-
- Bias in AI Systems (1)
- Conceptual Investigation (1)
- Data Mining (1)
- Deep Learning (1)
- Digital preservation (1)
- Ethical Considerations (1)
- Future AI (1)
- Human-AI Interaction (1)
- Human-Machine Interaction (1)
- Job Displacement (1)
- Metamophosis (1)
- Natural Language Processing (1)
- Nebraska (1)
- Obfuscation (1)
- Program Analysis (1)
- Quantum Computing (1)
- Risks of AI (1)
- Robotics (1)
- SWOT (1)
- Safety (1)
- Semantic equivalence (1)
- Smart home (1)
- Survey (1)
- Publication
-
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Department of Economics: Faculty Publications (1)
- Library Philosophy and Practice (e-journal) (1)
- Nebraska College Preparatory Academy: Senior Capstone Projects (1)
Articles 1 - 8 of 8
Full-Text Articles in Information Security
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Copyright, Fair Use, Scholarly Communication, etc.
Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.
My Administration places the highest urgency …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah
Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic environments, and facilitating interactions across heterogeneous domains. Accordingly, assessing the security thereof is a pressing need, yet requires high levels of scalability and reliability to handle the dynamism involved in such volatile ecosystems.
This dissertation seeks to enhance conventional security detection methods to cope with the emergent features of contemporary software ecosystems. In particular, it analyzes the security of Android and IoT ecosystems by developing rigorous vulnerability detection methods. A critical aspect of this work is the …
Surveying Digital Collections Stewardship In Nebraska [Original Survey Form], Jennifer L. Thoegersen, Blake Graham
Surveying Digital Collections Stewardship In Nebraska [Original Survey Form], Jennifer L. Thoegersen, Blake Graham
University of Nebraska-Lincoln Data Repository
No abstract provided.
The Economics Of The Right To Be Forgotten, Byung-Cheol Kim, Jin Yeub Kim
The Economics Of The Right To Be Forgotten, Byung-Cheol Kim, Jin Yeub Kim
Department of Economics: Faculty Publications
Scholars and practitioners debate whether to expand the scope of the right to be forgotten—the right to have certain links removed from search results—to encompass global search results. The debate centers on the assumption that the expansion will increase the incidence of link removal, which reinforces privacy while hampering free speech. We develop a game-theoretic model to show that the expansion of the right to be forgotten can reduce the incidence of link removal. We also show that the expansion does not necessarily enhance the welfare of individuals who request removal and that it can either improve or reduce societal …
Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu
Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and …
Significant Permission Identification For Android Malware Detection, Lichao Sun
Significant Permission Identification For Android Malware Detection, Lichao Sun
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
A recent report indicates that a newly developed malicious app for Android is introduced every 11 seconds. To combat this alarming rate of malware creation, we need a scalable malware detection approach that is effective and efficient. In this thesis, we introduce SigPID, a malware detection system based on permission analysis to cope with the rapid increase in the number of Android malware. Instead of analyzing all 135 Android permissions, our approach applies 3-level pruning by mining the permission data to identify only significant permissions that can be effective in distinguishing benign and malicious apps. Based on the identified significant …
The Unforeseen Evolution Of Technology, Dylan White
The Unforeseen Evolution Of Technology, Dylan White
Nebraska College Preparatory Academy: Senior Capstone Projects
Technology has evolved in the past two decades to alter how countries and their people live in the present day. Said technology has also both solved and created new problems for world powers (i.e. the U.S. and China) to face. Issues of cyber security and cyber surveillance are already potential problems that need to be addressed, where topics like cyber warfare need to be closely monitored with time. All of these are potentially underestimated threats to civil liberties, and to countries in their entirety.
I agree with the findings in my project… • The United States is a model to …