Page 180 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 180

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        is a double edged sword because any error in the technology will have negative real-world
        consequences  that  will  emerge far faster, and be far more  wide-reaching,  than  anything
                               7
        legacy analysis could achieve . This is because, in a legacy world of relatively slow scientific
        analysis, debate and falsification is a slow process, which gives people (both powerful and
        not) time to adjust to developments and change. This will not be the case with a ML tool.
        Analysis will be swift and debated only within the machine. It is vitally important, therefore,
        to ensure ML uses “good” data by considering ALL aspects of “threat”, however it might be
        defined, over time and across geographical and social boundaries. In doing this, the ML will
        not only be more accurately and reliably utilised to identify threat, but it is more likely that
        the machine judgement of threat will be trusted by all stakeholders, namely government(s),
        people with economic self-interest, and the population at large.

        In this sense, trust in the accuracy, legitimacy and fairness (whatever this is) resulting from
        ML is the most important factor in assessing whether or not the execution of an ML tool is a
        success that adds value to society. Significant changes and developments in business models
        and the attitudes of governments and others in positions of power (and society at large) are
        likely to be required in order for ML tools to be trusted enough to be effectively deployed.


        5  Changes Required for the Successful Implementation
             of ML to Identify Threat


        Given everything that has been discussed in this paper, there are a number of changes that
        need to occur for ML to be successfully or, more correctly, meaningfully deployed.

        5.1 The Assumptions when Programming ML

        When researching human subjects, it is vital to consider the human idiosyncrasies noted
        by Blumer (1989), along with the (much) wider contexts in which all behaviour occurs –
        including scientific analysis itself. Three fundamental assumptions must be at the core of ML
        programming – the same assumptions for researching all human subjects (e.g. Denzin, 1989;
        Blumer, 1989; Dunning, 1999):
        •  Reality is a social product.
        •  Humans can guide their own futures and that of others.
        •  Humans are  social  beings;  they  must  interact  with  each  other, and  gain  meaning  and
           insight in so doing.

        Such assumptions can no longer be considered merely as academic niceties, of no value in the
        real world. When dealing with ML, such considerations are the new real world.

        5.2 Attitudes Towards Data, Privacy and Security

        In the new real world, attitudes  towards data, privacy and security must, probably and
        necessarily, change – not only as a necessity for programming the ML, but as a result of its

        7   As an example of what could happen, I cite current attempts to shoe-horn legacy business models and
           approaches into social media technology. The superior new technology creates negative outcomes in models
           that used to work well with legacy technology.



       180
   175   176   177   178   179   180   181   182   183   184   185