Page 182 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 182

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        •  Attitudes towards data, privacy and security must change; not merely to make ML work,
           but also to help engender trust, minimise the potential disruption caused by the results
           of the technology, and ensure the technology continues to grow and adapt to an ever-
           changing environment.
        •  Prioritising worker health and achieving frictionless data-sharing could be disruptive in the
           short term. Attitudes of governments and business leaders must be proactively managed in
           order to facilitate the necessary adaptations in business models required to achieve these
           potential benefits with minimal disruption.



        7  References

        1.  AI for All (2020) from http://ai-4-all.org/about/what-is-ai/
        2.  Baker, P. (2014). Why Big Data Hasn’t Reinvented Advertising…Yet. FierceBigData.com.
        3.  Ballard, G. S. D. (1999). Pump Fiction: How Elite New Zealand Bodybuilders View The Anabolic
           Steroid Debate. The Journal of Performance Enhancing Drugs, 2 (4), 21-25.
        4.  BBC (2019). Facial Recognition Fails on Race, Government Study Says. From https://www.bbc.
           co.uk/news/technology-50865437
        5.  Blumer, H. (1989). Society and Symbolic Interaction. In Hammersley, M., The Dilemma of the
           Qualitative Method. London: Routledge.
        6.  Caleta, D. (2011). A Comprehensive Approach to the Management of Risks Related to the
           Protection of Critical Infrastructure: Public-Private Partnership. In D. Caleta, P. Shemella (Eds.),
           Counter Terrorism Challenges Regarding the Process of Critical Infrastructure Protection.
           Ljubljana, Slovenia: Institute of Corporative Security Studies, and Monterey, USA: Center for
           Civil-Military Relations.
        7.  Denzin, N. K. (1989). The Research Act: A Theoretical Introduction to Sociological Methods.
           Englewood Cliffs, N.J.: Prentice Hall.
        8.  Dunning, E. (1999). Sport Matters: Sociological Studies of Sport, Violence and Civilisation. Lon-
           don: Routledge.
        9.  Engel, J.F., Blackwell, R.D., Miniard, P.W. (1993). Consumer Behaviour (7th ed). Fort Worth: The
           Dryden Press.
        10. Eysenck, H.J. (1963). Personality and Drug Effects. In R.E. Franken (1988). Human Motivation.
           California: Brooks/Cole publishing.
        11. Eysenck, H.J. (1967). The Biological Basis of Personality, in R.E. Franken (1988). Human Moti-
           vation. California: Brooks/Cole publishing.

        12. Franken, R.E. (1988). Human Motivation. California: Brooks/Cole publishing.
        13. Fletcher, C. (1974). Beneath the Surface: An Account of Three Styles of Sociological Research.
           London: Routledge and Keegan Paul.
        14. Gillespie, S. M., Williams, R., Elliott, I. A., Eldridge, H. J., Ashfield, S., Beech, R. (2015). Char-
           acteristics of Females Who Sexually Offend: A Comparison of Solo and Co-Offenders. Sexual
           Abuse, 27 (3), 284-301.
        15. Gjoreski, M., Lustrek, M., Gams, M., Gjoteski, H. (2017): Monitoring Stress with a Wrist Device
           Using Context. Journal of Biomedical Infomatics. Vol 17, 159-170.




       182
   177   178   179   180   181   182   183   184   185   186   187