AI development and application of AI-based solutions in the area of information and data management in Poland

被引:0
作者
Chmielarz, Grzegorz [1 ]
Pabian, Arnold [1 ]
机构
[1] Czestochowa Tech Univ, Fac Management, Czestochowa, Poland
来源
2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM) | 2020年
关键词
AI; cybercrime; cybersecurity; security management;
D O I
10.23919/cnsm50824.2020.9269103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The intensity of cyberattacks aimed at information resources of Polish organisations is growing. Polish entrepreneurs are concerned about hacking attacks and cybercrime prevalent in the contemporary digital world. Tools traditionally applied in the cybersecurity area are becoming insufficient in ensuring protection against ever more sophisticated types of cyberattacks. Therefore, it seems reasonable to search for new solutions that can support organisations in combating cyberthreats. One of them can be application of Artificial Intelligence (AI) in the domain of information and data management in Polish organisations. These solutions offer new capacities that can be successfully utilised for the benefit of organisations that wish to secure themselves against growing occurrences of cyberattacks. Yet, the knowledge of Polish organisations pertaining to possibility of applying AI in the cybersecurity area is relatively low. This needs to be changed as the application of AI in this domain is no longer an option but a necessity.
引用
收藏
页数:8
相关论文
共 15 条
[1]  
[Anonymous], 2019, WORLDW SPEND AI SYST
[2]   Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy [J].
Dwivedi, Yogesh K. ;
Hughes, Laurie ;
Ismagilova, Elvira ;
Aarts, Gert ;
Coombs, Crispin ;
Crick, Tom ;
Duan, Yanqing ;
Dwivedi, Rohita ;
Edwards, John ;
Eirug, Aled ;
Galanos, Vassilis ;
Ilavarasan, P. Vigneswara ;
Janssen, Marijn ;
Jones, Paul ;
Kar, Arpan Kumar ;
Kizgin, Hatice ;
Kronemann, Bianca ;
Lal, Banita ;
Lucini, Biagio ;
Medaglia, Rony ;
Le Meunier-FitzHugh, Kenneth ;
Le Meunier-FitzHugh, Leslie Caroline ;
Misra, Santosh ;
Mogaji, Emmanuel ;
Sharma, Sujeet Kumar ;
Singh, Jang Bahadur ;
Raghavan, Vishnupriya ;
Raman, Ramakrishnan ;
Rana, Nripendra P. ;
Samothrakis, Spyridon ;
Spencer, Jak ;
Tamilmani, Kuttimani ;
Tubadji, Annie ;
Walton, Paul ;
Williams, Michael D. .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2021, 57
[3]  
Gupta Shivangi, 2019, INT J RECENT TECHNOL, V8, P6133, DOI [10.35940/ijrte.C5675.098319)., DOI 10.35940/IJRTE.C5675.098319)]
[4]  
Gyires-Tóth B, 2019, 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), P575
[5]   Demystifying the role of AI for better network security [J].
Kurpjuhn T. .
Network Security, 2019, 2019 (08) :14-17
[6]   Evaluation of Cybersecurity Data Set Characteristics for Their Applicability to Neural Networks Algorithms Detecting Cybersecurity Anomalies [J].
Larriva-Novo, Xavier A. ;
Vega-Barbas, Mario ;
Villagra, Victor A. ;
Sanz Rodrigo, Mario .
IEEE ACCESS, 2020, 8 :9005-9014
[7]   Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles [J].
Lee, Jonghoon ;
Kim, Jonghyun ;
Kim, Ikkyun ;
Han, Kijun .
IEEE ACCESS, 2019, 7 :165607-165626
[8]   AI and Big Data: A blueprint for a human rights, social and ethical impact assessment [J].
Mantelero, Alessandro .
COMPUTER LAW & SECURITY REVIEW, 2018, 34 (04) :754-772
[9]   Artificial Inteligence-Based Security Authentication: Applications in Wireless Multimedia Networks [J].
Qiu, Xiaoying ;
Du, Zhiguo ;
Sun, Xuan .
IEEE ACCESS, 2019, 7 :172004-172011
[10]  
Ramachandran R., 2019, ENTREPRENEUR