Page 110 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 110
SECTION II: CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION
49. Stewart Phil (December 21, 2016), “Exclusive: U.S.-supplied drones disappoint Ukraine at the
front lines”, Reuters, accessed at: https://www.reuters.com/article/us-usa-ukraine-drones-exclu-
sive-idUSKBN14A26D
50. The European Commission, (2018), “Shaping Europe’s digital future, Artificial Intelligence” ac-
cessed at: https://ec.europa.eu/digital-single-market/en/artificial-intelligence
51. The EU Institute for Security Studies, (November 14, 2019), “The EU, NATO and Artificial Intel-
ligence”, Conference Report, accessed at: https://www.iss.europa.eu/sites/default/files/EUISSFiles/
EU%20NATO%20AI%20-%20Report.pdf
52. The US Congress, (1988), “The Nation at Risk, Report of the President’s Commission on Critical
Infrastructure Protection”, United States. Congress, Senate, Committee on the Judiciary, Subcom-
mittee on Technology, Terrorism, and Government Information, Volume 4.
53. The US Election Commission, (2017), “Elections – Critical Infrastructure, Election Management”,
Resources accessed at: https://www.eac.gov/election-officials/elections-critical-infrastructure
54. The US Election Assistance Commission, (2017a), “Starting Point: US Election Systems as
Critical Infrastructure”, accessed at: https://www.eac.gov/sites/default/files/eac_assets/1/6/start-
ing_point_us_election_systems_as_Critical_Infrastructure.pdf
55. The US Homeland Security, (July 2017), “Narrative Analysis Research Paper, Artificial Intelli-
gence”, National Protection And Programs Directorate | Office Of Cyber And Infrastructure Analy-
sis, accessed at: https://info.publicintelligence.net/OCIA-ArtificialIntelligence.pdf
56. Triolo Paul, Kania Elsa, & Webster Graham, (January 26, 2018), “Translation: Chinese govern-
ment outlines AI ambitions through 2020”, New America, accessed at: https://www.newamerica.
org/cybersecurity-initiative/digichina/blog/translation-chinese-government-outlines-ai-ambitions-
through-2020/
57. Yonah Alexander, (2018), “Security Challenges in the Balkans”, The Inter-University Centre for
Terrorism Studies, accessed at: https://potomacinstitute.org/images/stories/publications/Security_
Challenges_in_the_Balkans_Report.pdf
58. Valášek Tomáš, (August 31, 2017), “How Artificial Intelligence Could Disrupt Alliances” Carnegie
Europe, accessed at: https://carnegieeurope.eu/strategiceurope/72966.)
59. Valášek Tomáš, (February 16, 2018), “European defence vs. NATO: Not the right fight”, Politico,
accessed at: https://www.politico.eu/article/european-defence-vs-nato-not-the-right-fight/
60. Villani Cédric, (March 8, 2018), For a Meaningful Artificial Intelligence Towards a French And
European Strategy for AI, Mission assigned by the Prime Minister Édouard Philippe, accessed at:
https://www.aiforhumanity.fr/pdfs/MissionVillani_Report_ENG-VF.pdf
61. Walch Kathleen, (December 22, 2019), “Why Cognitive Technology May Be A Bet-
ter Term Than Artificial Intelligence”, Forbes, accessed at: https://www.forbes.com/sites/
cognitiveworld/2019/12/22/why-cognitive-technology-may-be-a-better-term-than-artificial-
intelligence/#7c8cd006197c
62. Willke J. Bradford, (September 19, 2007), “A Critical Information Infrastructure Protection Ap-
proach to Multinational Cyber Security Events”, Carnegie Mellon University, accessed at (https://
www.enisa.europa.eu/topics/csirts-in-europe/files/event-files/ENISA_best_practices_for_ciip_
Willke.pdf
110