Information security: subjectivity and artificial intelligence
DOI:
https://doi.org/10.51599/is.2024.08.02.09Keywords:
globalization, global information space, information security, artificial intelligence.Abstract
Purpose. The purpose of the study is to determine the features of the use of artificial intelligence in order to strengthen the congruence of information security systems with the trends of the world information space.
Results. The peculiarities of the global information space are identified, which are the source of actualisation of the factors of scaling threats to information security and the difficulty of implementing the principles of building the information security system, compliance with the criteria of effective management. The use of artificial intelligence transforms subjectivity into a digital plane, which marks a fundamental transition from simple data aggregation to intelligent analysis, which allows not only detecting threats, but also conducting proactive searches. The use of reliable and ethical artificial intelligence strengthens information security, increases public trust and reduces uncertainty. As a technology of action and countermeasures, artificial intelligence allows increasing objectivity, speed of formation and completeness of situational awareness. The effectiveness of the use of artificial intelligence models depends on the preservation of the human component, the development of “joint cognitive systems” is the optimal balance between analysts and algorithms.
Scientific novelty. For the first time, the conceptual foundations of the development of the information security system and the factors of scaling the threat due to the primacy of the features of the global information space were analysed; the functional capabilities of artificial intelligence as an associated subject of information security, an integrative component of the effectiveness of the information security system in the globalised information space are deepened; the conceptual vision of the information security model is expanded and the feasibility of developing the concept of an integrated projective information security system based on the principle of duality is substantiated.
Practical value. The conducted analysis of the capabilities of artificial intelligence to ensure information security is the basis for developing the concept of an integrated projective system of information security based on the principle of duality, which consists in matching key nodes in the architecture of the world information space with points in the designed information space of the security system. Each such point corresponds to a certain analytical mechanism. The integrity of the system is ensured by connections between these mechanisms. Thus, we are moving away from a fragmented response to threats to a plastic security system based on the use of artificial intelligence.
References
KOF Index of Globalization. URL: https://kof.ethz.ch/en/forecasts-and-indicators/indicators/kof-globalisation-index.html.
Bortnikova O., Kashperska D., Leonov O., Rubel K. et al. Information security of the state: motives, necessity, and sufficiency criteria. Lex Humana. 2024. Vol. 16. No. 1. Pp. 1–19. URL: https://seer.ucp.br/seer/index.php/LexHumana/article/view/2837.
Wu J., Gao D., Haverly A., Mittal S. et al. AI ethics: a bibliometric analysis, critical issues, and key gaps. International Journal of Business Analytics. 2024. Vol. 11. Is. 1. Pp. 1–19. https://doi.org/10.48550/arXiv.2403.14681.
Глобенко C. Інформаційний простір державита проблеми забезпечення його захистув україні. Науковий вісник: Державне управління. 2023. № 1(13). С. 195–210. https://doi.org/10.33269/2618-0065-2023-1(13)-195-210.
Buhaichuk K., Warawa W., Batrachenko T., Cherniavska B. et al. Cybercrimes in the global security system in modern conditions. Lex Humana. 2023. Vol. 15. No. 2. Pp. 26–44. URL: https://seer.ucp.br/seer/index.php/LexHumana/article/view/2474.
Сhmyr Y., Nekryach A., Kochybei L., Dakal А. et al. Postindustrial society and global informational space as infrastructure medium and factor for actualization of the state informational security. National Security Drivers of Ukraine, Contributions to Political Science; eds. O. Radchenko, V. Kovach, I. Semenets-Orlova, A. Zaporozhets. Cham: Springer. Pp. 61–73. https://doi.org/10.1007/978-3-031-33724-6_4.
Бондар В. Т. Штучний інтелект як інструмент публічного управління в забезпеченні інформаційно-психологічної безпеки. Досвід США. Наукові перспективи. 2023. № 12(42). С. 81–87. https://doi.org/10.52058/2708-7530-2023-12(42)-80-87.
Ievdokymov V., Frikel A., Polishchuk V., Savchuk S., et al. Cybercrime and information protection in the field of state security: current threats and measures for their prevention. Economic Affairs. 2024. Vol. 69. Spec. is. Pp. 61–69. https://doi.org/10.46852/0424-2513.1.2024.8.
Hovorushchenko T., Izonin I., Kutucu H. Advancements in ai-based information technologies: solutions for quality and security. Systems. 2024. Vol. 12. Is. 2. 58. https://doi.org/10.3390/systems12020058.
Upreti R., Lind P. G., Elmokashfi A., Yazidi А. Trustworthy machine learning in the context of security and privacy. International Journal of Information Security. 2024. Vol. 23. Pp. 2287–2314. https://doi.org/10.1007/s10207-024-00813-3.
Zacharis A., Katos V., Patsakis C. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. International Journal of Information Security. 2024. Vol. 23. Pp. 2691–2710. https://doi.org/ 10.1007/s10207-024-00860-w.
Dubovskyi O. Features of world information space in the context of criterion analysis of globalization phenomenon. Acta De Historia & Politica: Saeculum XXI. 2024. Vol. 8. Pp. 99–107. https://doi.org/10.26693/ahpsxxi2024.08.099.
Юськів Б. Глобалізація і трудова міграція в Європі: моногр. Рівне: вид. О. М. Зень, 2009. 476 с. URL: https://evnuir.vnu.edu.ua/bitstream/123456789/15964/1/Yuskiv_Global%20migration.pdf.
Lahmann H. Protecting the global information space in times of armed conflict. International Review of the Red Cross. 2020. Vol. 102. Is. 915. Pp. 1227–1248. https://doi.org/10.1017/S1816383121000400.
Schlette D., Böhm F., Caselli M., Pernul G. Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security. 2021. Vol. 20. Pp. 21–38. https://doi.org/10.1007/s10207-020-00490-y.
Skopik F., Bonitz A., Grantz V., Göhler G. From scattered data to actionable knowledge: flexible cyber security reporting in the military domain. International Journal of Information Security. 2022. Vol. 21. 1323–1347. https://doi.org/10.1007/s10207-022-00613-7.
National Cyber Security Index (NCSI). e-Governance Academy. URL: https://ncsi.ega.ee.
White G. Strategic, tactical, and operational management security model. Journal of Computer Information Systems. 2009. Vol. 49(3). Pp. 71–75. Available at: https://www.researchgate.net/publication/289007413.
Ghioni R., Taddeo M., Floridi L. Open source intelligence and AI: a systematic review of the GELSI literature. AI & Society. 2024. Vol. 39. Pp. 1827–1842. https://doi.org/10.1007/s00146-023-01628-x.
European Commission. High-level expert group on artificial intelligence. Ethics guidelines for trustworthy АІ. URL: https://digital-strategy.ec.europa.eu/en/policies/expert-group-ai.
References
KOF Index of Globalization (n.d.). Available at: https://kof.ethz.ch/en/forecasts-and-indicators/indicators/kof-globalisation-index.html.
Bortnikova, O., Kashperska, D., Leonov, O., Rubel, K., & Chumak, O. (2024). Information security of the state: motives, necessity, and sufficiency criteria. Lex Humana, 16(1), 1–19. Available at https://seer.ucp.br/seer/index.php/LexHumana/article/view/2837.
Wu, J., Gao, D., Haverly, A., Mittal, S., & Chen, J. (2024). AI ethics: a bibliometric analysis, critical issues, and key gaps. International Journal of Business Analytics, 11(1), 1–19. https://doi.org/10.4018/IJBAN.338367.
Hlobenko, S. (2023). Information space of the state and problems of ensuring its protection in Ukraine. Scientific Herald: Public Administration, 1(13), 195–210. https://doi.org/10.33269/2618-0065-2023-1(13)-195-210.
Buhaichuk, K., Warawa, W., Batrachenko, T., Cherniavska, B., & Kondel, V. (2023). Cybercrimes in the global security system in modern conditions. Lex Humana, 15(2), 26–44. Available at: https://seer.ucp.br/seer/index.php/LexHumana/article/view/2474.
Chmyr, Y., Nekryach, A., Kochybei, L., Dakal, А., & Strelbytska, L. (2023). Postindustrial society and global informational space as infrastructure medium and factor for actualization of the state informational security. In O. Radchenko, V. Kovach, I. Semenets-Orlova, A. Zaporozhets (Eds.), National Security Drivers of Ukraine. Contributions to Political Science (pp. 61–73). Springer, Cham. https://doi.org/10.1007/978-3-031-33724-6_4.
Bondar, V. (2023). Artificial intelligence as a tool of public administration in ensuring informational and psychological security. USA experience. Journal of Scientific Perspectives, 12(42), 81–87. https://doi.org/10.52058/2708-7530-2023-12(42)-80-87.
Ievdokymov, V., Frikel, A., Polishchuk, V., Savchuk, S., & Klimova, I. (2024). Cybercrime and information protection in the field of state security: current threats and measures for their prevention. Economic Affairs, 69, 61–69. https://doi.org/10.46852/0424-2513.1.2024.8.
Hovorushchenko, T., Izonin, I., & Kutucu, H. (2024). Advancements in ai-based information technologies: solutions for quality and security. Systems, 12(2), 58. https://doi.org/10.3390/systems12020058.
Upreti, R., Lind, P. G., Elmokashfi, A., & Yazidi, А. (2024). Trustworthy machine learning in the context of security and privacy. International Journal of Information Security, 23, 2287–2314. https://doi.org/10.1007/s10207-024-00813-3.
Zacharis, A., Katos, V., & Patsakis, C. (2024). Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. International Journal of Information Security, 23, 2691–2710. https://doi.org/10.1007/ s10207-024-00860-w.
Dubovskyi, O. (2024). Features of world information space in the context of criterion analysis of globalization phenomenon. Acta De Historia & Politica: Saeculum XXI, 8, 99–107. https://doi.org/10.26693/ahpsxxi2024.08.099.
Yuskiv, В. (2009). Hlobalizatsiia i trudova mihratsiia v Yevropi [Globalization and labor migration in Europe]. O. M. Zen, Rivne.
Lahmann, H. (2020). Protecting the global information space in times of armed conflict. International Review of the Red Cross, 102(915), 1227–1248. https://doi.org/10.1017/S1816383121000400.
Schlette, D., Böhm, F., Caselli, M., & Pernul, G. (2021). Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20, 21–38. https://doi.org/10.1007/s10207-020-00490-y.
Skopik, F., Bonitz, A., Grantz, V., & Göhler, G. (2022). From scattered data to actionable knowledge: flexible cyber security reporting in the military domain. International Journal of Information Security, 21, 1323–1347. https://doi.org/10.1007/s10207-022-00613-7.
National Cyber Security Index (NCSI) (n.d.). e-Governance Academy. URL: https://ncsi.ega.ee.
White, G. (2009). Strategic, tactical, and operational management security model. Journal of Computer Information Systems, 49(3), 71–75. https://doi.org/10.1080/08874417.2009.11645326.
Ghioni, R., Taddeo, M., & Floridi, L. (2023). Open source intelligence and AI: a systematic review of the GELSI literature. AI & Society, 39, 1827–1842. https://doi.org/10.1007/s00146-023-01628-x.
European Commission (2019). High-level expert group on artificial intelligence. Ethics guidelines for trustworthy АІ. Available at: https://digital-strategy.ec.europa.eu/en/policies/expert-group-ai.