AI Uncertainty in expert decision making: A qualitative evidence synthesis

CA Grundstrom, P Mohanty… - … Co-creating Sustainable …, 2023 - ntnuopen.ntnu.no
As Artificial Intelligence (AI) is becoming more prevalent in everyday work settings, the
Information Systems (IS) discipline is perfectly poised to study the sociotechnical …

Can we evaluate the impact of cyber security information sharing?

A Zibak, A Simpson - 2018 International Conference On Cyber …, 2018 - ieeexplore.ieee.org
Once concentrated on protecting critical infrastructure, cyber security information sharing
efforts have evolved in recent years to include many industries and have resulted in the …

Machine Learning Explainability for Intrusion Detection in the Industrial Internet of Things

LAC Ahakonye, CI Nwakanma… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Intrusion and attacks have consistently challenged the Industrial Internet of Things (IIoT).
Although artificial intelligence (AI) rapidly develops in attack detection and mitigation …

A collaboration-centric taxonomy of the Internet of Things: implications for awareness support

O Eris, JL Drury, D Ercolini - Internet of Things, 2021 - Elsevier
Abstract The Internet of Things (IoT) has the potential to become a new collaboration
modality. Building on this proposition, we developed a taxonomy to explore how the IoT can …

Applications of llms for generating cyber security exercise scenarios

MM Yamin, E Hashmi, M Ullah, B Katt - 2024 - researchsquare.com
This study proposes a novel approach leveraging Large Language Models (LLMs) to
generate dynamic and complex adaptable cybersecu-rity exercise scenarios. Motivated by …

Transparency of military threat evaluation through visualizing uncertainty and system rationale

T Helldin, G Falkman, M Riveiro, A Dahlbom… - … and Services: 10th …, 2013 - Springer
Threat evaluation (TE) is concerned with determining the intent, capability and opportunity of
detected targets. To their aid, military operators use support systems that analyse incoming …

An exploratory study on how Internet of Things developing companies handle User Experience Requirements

J Bergman, T Olsson, I Johansson… - … Foundation for Software …, 2018 - Springer
Abstract [Context and motivation] Internet of Things (IoT) is becoming common throughout
everyday lives. However, the interaction is often different from when using eg computers and …

[PDF][PDF] Helping ICT professionals to assess ethical issues in new and emerging technologies

I Harris, R Jennings, D Pullinger… - MINAmI workshop on …, 2008 - academia.edu
In the field of computer ethics there has been a move over recent years from the ethical
assessment of technology applications already released on to the market towards a …

A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

Beneficial artificial intelligence coordination by means of a value sensitive design approach

S Umbrello - Big Data and Cognitive Computing, 2019 - mdpi.com
This paper argues that the Value Sensitive Design (VSD) methodology provides a principled
approach to embedding common values into AI systems both early and throughout the …