Page 110 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 110

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        49. Stewart Phil (December 21, 2016), “Exclusive: U.S.-supplied drones disappoint Ukraine at the
           front lines”, Reuters, accessed at: https://www.reuters.com/article/us-usa-ukraine-drones-exclu-
           sive-idUSKBN14A26D
        50. The European Commission, (2018), “Shaping Europe’s digital future, Artificial Intelligence” ac-
           cessed at: https://ec.europa.eu/digital-single-market/en/artificial-intelligence
        51. The EU Institute for Security Studies, (November 14, 2019), “The EU, NATO and Artificial Intel-
           ligence”, Conference Report, accessed at: https://www.iss.europa.eu/sites/default/files/EUISSFiles/
           EU%20NATO%20AI%20-%20Report.pdf
        52. The US Congress, (1988), “The Nation at Risk, Report of the President’s Commission on Critical
           Infrastructure Protection”, United States. Congress, Senate, Committee on the Judiciary, Subcom-
           mittee on Technology, Terrorism, and Government Information, Volume 4.
        53. The US Election Commission, (2017), “Elections – Critical Infrastructure, Election Management”,
           Resources accessed at: https://www.eac.gov/election-officials/elections-critical-infrastructure
        54. The US Election Assistance Commission, (2017a), “Starting Point: US Election Systems as
           Critical Infrastructure”, accessed at: https://www.eac.gov/sites/default/files/eac_assets/1/6/start-
           ing_point_us_election_systems_as_Critical_Infrastructure.pdf
        55. The US Homeland Security, (July 2017), “Narrative Analysis Research Paper, Artificial Intelli-
           gence”, National Protection And Programs Directorate | Office Of Cyber And Infrastructure Analy-
           sis, accessed at: https://info.publicintelligence.net/OCIA-ArtificialIntelligence.pdf
        56. Triolo Paul, Kania Elsa, & Webster Graham, (January 26, 2018), “Translation: Chinese govern-
           ment outlines AI ambitions through 2020”, New America, accessed at: https://www.newamerica.
           org/cybersecurity-initiative/digichina/blog/translation-chinese-government-outlines-ai-ambitions-
           through-2020/
        57. Yonah Alexander, (2018), “Security Challenges in the Balkans”, The Inter-University Centre for
           Terrorism Studies, accessed at: https://potomacinstitute.org/images/stories/publications/Security_
           Challenges_in_the_Balkans_Report.pdf
        58. Valášek Tomáš, (August 31, 2017), “How Artificial Intelligence Could Disrupt Alliances” Carnegie
           Europe, accessed at: https://carnegieeurope.eu/strategiceurope/72966.)
        59. Valášek Tomáš, (February 16, 2018), “European defence vs. NATO: Not the right fight”, Politico,
           accessed at: https://www.politico.eu/article/european-defence-vs-nato-not-the-right-fight/
        60. Villani Cédric, (March 8, 2018), For a Meaningful Artificial Intelligence Towards a French And
           European Strategy for AI, Mission assigned by the Prime Minister Édouard Philippe, accessed at:
           https://www.aiforhumanity.fr/pdfs/MissionVillani_Report_ENG-VF.pdf

        61. Walch Kathleen, (December 22, 2019), “Why Cognitive Technology May Be A Bet-
           ter Term Than Artificial Intelligence”, Forbes, accessed at: https://www.forbes.com/sites/
           cognitiveworld/2019/12/22/why-cognitive-technology-may-be-a-better-term-than-artificial-
           intelligence/#7c8cd006197c
        62. Willke J. Bradford, (September 19, 2007), “A Critical Information Infrastructure Protection Ap-
           proach to Multinational Cyber Security Events”, Carnegie Mellon University, accessed at (https://
           www.enisa.europa.eu/topics/csirts-in-europe/files/event-files/ENISA_best_practices_for_ciip_
           Willke.pdf









       110
   105   106   107   108   109   110   111   112   113   114   115