Notes
References
Acalvio Autonomous Deception. (2019). Acalvio. https://www.acalvio.com/.
Accenture. (2017). 2017 Cost of cyber crime study. Accenture. https://www.accenture.com/gb-en/insight-cost-of-cybercrime-2017.
BehavioSec: Continuous Authentication Through Behavioral Biometrics. (2019). BehavioSec. https://www.behaviosec.com/.
DarkLight Offers First of Its Kind Artificial Intelligence to Enhance Cybersecurity Defenses. (2017). 26 July 2017. https://www.businesswire.com/news/home/20170726005117/en/DarkLight-Offers-Kind-Artificial-Intelligence-Enhance-Cybersecurity.
DeepLocker: How AI Can Power a Stealthy New Breed of Malware. (2018). Security intelligence (blog). 8 August 2018. https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/.
Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083), 20160360. https://doi.org/10.1098/rsta.2016.0360.
Mirsky, Y., Mahler, T., Shelef, I., & Elovici, Y. (2019). CT-GAN: Malicious tampering of 3D medical imagery using deep learning. ResearchGate. https://www.researchgate.net/publication/330357848_CT-GAN_Malicious_Tampering_of_3D_Medical_Imagery_using_Deep_Learning/figures?lo=1.
Taddeo, M. (2012). An analysis for a just cyber warfare. In 2012 4th international conference on cyber conflict (CYCON 2012) (pp. 1–10).
Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–356. https://doi.org/10.1007/s13347-013-0140-9.
Taddeo, M. (2014a). Just information warfare. Topoi. https://doi.org/10.1007/s11245-014-9245-8.
Taddeo, M. (2014b). The struggle between liberties and authorities in the information age. Science and Engineering Ethics. https://doi.org/10.1007/s11948-014-9586-0.
Taddeo, M. (2017a). The limits of deterrence theory in cyberspace. Philosophy and Technology. https://doi.org/10.1007/s13347-017-0290-2.
Taddeo, M. (2017b). Deterrence by norms to stop interstate cyber attacks. Minds and Machines. https://doi.org/10.1007/s11023-017-9446-1.
Taddeo, M., & Floridi, L. (2018a). Regulate artificial intelligence to avert cyber arms race. Nature, 556(7701), 296–298. https://doi.org/10.1038/d41586-018-04602-6.
Taddeo, M., & Floridi, L. (2018b). How AI can be a force for good. Science, 361(6404), 751–752. https://doi.org/10.1126/science.aat5991.
The 2019 Official Annual Cybercrime Report. (2019). Herjavec group. https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/.
Yang, G.-Z., Bellingham, J., Dupont, P. E., Fischer, P., Floridi, L., Full, R., et al. (2018). The grand challenges of science robotics. Science Robotics, 3(14), 7650. https://doi.org/10.1126/scirobotics.aar7650.
Zhuge, J., Holz, T., Han, X., Song, C., & Zou, W. (2007). Collecting autonomous spreading malware using high-interaction honeypots. In S. Qing, H. Imai, & G. Wang (Eds.), Information and communications security. Lecture notes in computer science (pp. 438–451). Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Taddeo, M. Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity. Minds & Machines 29, 187–191 (2019). https://doi.org/10.1007/s11023-019-09504-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11023-019-09504-8