Information Environment Security

被引:0
|
作者
Waltzman, Rand [1 ]
机构
[1] DARPA, Arlington, VA 22203 USA
来源
PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14) | 2014年
关键词
Information environment; security; cognitive science; computer science; social science; marketing; political campaigning; public policy; psychology;
D O I
10.1145/2623330.2635636
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The US Department of Defense Dictionary of Military terms defines the Information Environment as "the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information." The decisions and actions we take both as individuals and collectively simultaneously shape and are shaped by the information environment in which we live. The nature of our interaction with the information environment is rapidly evolving and old models are becoming irrelevant faster than we can develop new ones. This results in uncertainties that leave us exposed to dangerous influences without proper defenses. The purpose of this talk is to help frame a new science of Information Environment Security (IES) whose goal is to create and apply the tools needed to discover and maintain fundamental models of our ever-changing information environment and to defend us in that environment, both as individuals and collectively, against intentional as well as unintentional attempts to deceive, misinform and otherwise manipulate us. IES is an interdisciplinary science that will require bringing together experts working in areas such as cognitive science, computer science, social science, security, marketing, political campaigning, public policy, and psychology to develop a theoretical as well as an applied engineering methodology for managing the full spectrum of information environment security issues.
引用
收藏
页码:1521 / 1521
页数:1
相关论文
共 50 条
  • [31] Information Security, new approach
    Elachgar, Hicham
    Regragui, Boubker
    2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 51 - 56
  • [32] The Human Element of Information Security
    Thompson, Hugh
    IEEE SECURITY & PRIVACY, 2013, 11 (01) : 32 - 35
  • [33] The Personal Information Security Assistant
    Kegel, Roeland H. P.
    2015 IEEE 23RD INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2015, : 393 - 397
  • [34] Reconceptualizing Security: Conceptual Quartet of Peace, Security, Development and Environment
    Brauch, Hans Guenter
    ULUSLARARASI ILISKILER-INTERNATIONAL RELATIONS, 2008, 5 (18): : 1 - 47
  • [35] Information Sovereignty as the Basis of Modern State Information Security
    Zozulia, Oleksandr
    Zozuha, Ihor
    Brusakova, Oksana
    Kholod, Yurii
    Berezhna, Yevheniia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 264 - 268
  • [36] The Internet and the Information Environment
    Borshchev, V. B.
    AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS, 2009, 43 (01) : 27 - 41
  • [37] The internet and the information environment
    V. B. Borshchev
    Automatic Documentation and Mathematical Linguistics, 2009, 43 (1) : 27 - 41
  • [38] Integrating VoIP/UC Security into the Holistic Information Security Planning
    Tas, I. Melih
    Ugurdogan, Bahar
    Tas, Huseyin
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 1002 - 1005
  • [39] AI and Security, From an Information Security and Risk Manager Standpoint
    Shetty, Pranith
    IEEE ACCESS, 2024, 12 : 77468 - 77474
  • [40] Information security policy's impact on reporting security incidents
    Wiant, TL
    COMPUTERS & SECURITY, 2005, 24 (06) : 448 - 459