Page 182 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 182
SECTION II: CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION
• Attitudes towards data, privacy and security must change; not merely to make ML work,
but also to help engender trust, minimise the potential disruption caused by the results
of the technology, and ensure the technology continues to grow and adapt to an ever-
changing environment.
• Prioritising worker health and achieving frictionless data-sharing could be disruptive in the
short term. Attitudes of governments and business leaders must be proactively managed in
order to facilitate the necessary adaptations in business models required to achieve these
potential benefits with minimal disruption.
7 References
1. AI for All (2020) from http://ai-4-all.org/about/what-is-ai/
2. Baker, P. (2014). Why Big Data Hasn’t Reinvented Advertising…Yet. FierceBigData.com.
3. Ballard, G. S. D. (1999). Pump Fiction: How Elite New Zealand Bodybuilders View The Anabolic
Steroid Debate. The Journal of Performance Enhancing Drugs, 2 (4), 21-25.
4. BBC (2019). Facial Recognition Fails on Race, Government Study Says. From https://www.bbc.
co.uk/news/technology-50865437
5. Blumer, H. (1989). Society and Symbolic Interaction. In Hammersley, M., The Dilemma of the
Qualitative Method. London: Routledge.
6. Caleta, D. (2011). A Comprehensive Approach to the Management of Risks Related to the
Protection of Critical Infrastructure: Public-Private Partnership. In D. Caleta, P. Shemella (Eds.),
Counter Terrorism Challenges Regarding the Process of Critical Infrastructure Protection.
Ljubljana, Slovenia: Institute of Corporative Security Studies, and Monterey, USA: Center for
Civil-Military Relations.
7. Denzin, N. K. (1989). The Research Act: A Theoretical Introduction to Sociological Methods.
Englewood Cliffs, N.J.: Prentice Hall.
8. Dunning, E. (1999). Sport Matters: Sociological Studies of Sport, Violence and Civilisation. Lon-
don: Routledge.
9. Engel, J.F., Blackwell, R.D., Miniard, P.W. (1993). Consumer Behaviour (7th ed). Fort Worth: The
Dryden Press.
10. Eysenck, H.J. (1963). Personality and Drug Effects. In R.E. Franken (1988). Human Motivation.
California: Brooks/Cole publishing.
11. Eysenck, H.J. (1967). The Biological Basis of Personality, in R.E. Franken (1988). Human Moti-
vation. California: Brooks/Cole publishing.
12. Franken, R.E. (1988). Human Motivation. California: Brooks/Cole publishing.
13. Fletcher, C. (1974). Beneath the Surface: An Account of Three Styles of Sociological Research.
London: Routledge and Keegan Paul.
14. Gillespie, S. M., Williams, R., Elliott, I. A., Eldridge, H. J., Ashfield, S., Beech, R. (2015). Char-
acteristics of Females Who Sexually Offend: A Comparison of Solo and Co-Offenders. Sexual
Abuse, 27 (3), 284-301.
15. Gjoreski, M., Lustrek, M., Gams, M., Gjoteski, H. (2017): Monitoring Stress with a Wrist Device
Using Context. Journal of Biomedical Infomatics. Vol 17, 159-170.
182