Science topics: Computer Security and ReliabilitySecurity
Science topic
Security - Science topic
Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition.
Questions related to Security
Since I started my PhD in 2019, this question has been a recurring challenge for me. Now, as a PhD graduate (2023) with a Master’s degree, I am highly motivated, hardworking, and committed to advancing my academic career. I have good language skills, have published several papers in multidisciplinary fields, and am still engaged in various research activities. I have been actively pursuing postdoctoral and research fellowship opportunities, applying to over 100 calls.
A significant hurdle I face is the requirement of securing a host supervisor or institution to apply for these fellowships. To fulfill this, I have sent hundreds of polite emails to professors worldwide, carefully tailoring each one to align with their research interests and including all necessary documents such as my CV, motivation letter, and a proposal synopsis. However, despite my efforts, I have received very few responses.
Before reaching out, I thoroughly review potential supervisors’ publications and research profiles to ensure alignment with their work. I remain persistent, applying and networking without frustration or hesitation. I also recognize that this challenge may not be unique to me but rather a common struggle for many early-career researchers.
I would greatly appreciate any advice or insights from this community regarding strategies to overcome this barrier.
How can I improve my approach or increase my chances of securing a host? Thank you in advance for sharing your thoughts and experiences.
Is there any study that provides information about the question:
Is ist possile, that children - after separation or divorce of their parents - will bondvery strongly with their one parent to whom their attachment befpre was not really secure, and that they may even reject the one parent thei have a secure and stable attachment to?
Or, to put the question differently, to what extent do states relinquish their sovereignty when they become part of multilateral international systems like the United Nations?
I am currently researching the topic of state sovereignty, and in one aspect of this topic, I have delved into international organizations and external commitments of states. Therefore, I am asking this question to confirm whether international organizations or external commitments can affect a state's sovereignty. Can any external entity influence a state's sovereignty? I have chosen the United Nations as a model and am looking into whether decisions made by the Security Council intervene in the sovereignty of states or not.
I would be very grateful if you could answer my question.
Even if ECFM has demonstrated effective methods of resolution in some contexts, its completeness and improvement of performance context are still lacking relative to the scope of literature, particularly when it comes to comparison with newer or hybrid factorization algorithms. In addition, the effect of elliptic curves factorization on the security of certain cryptographic protocols remains to be established, especially as technology continues to undergo rapid changes.
The research is to be conducted in order to provide an in depth analysis of the working of ECFM, its mathematical parameters, its working efficiency and its implications for the cryptographic security, more specifically the following questions shall be raised in this context:
What are the general implications of ECFM usage in performance of other for the state of the art factorization algorithms with respect to diverse computational environments?
What are the merits and the possible demerits of using ECFM in any given scenario where cryptography is exercised?
What are the suggested methods of performance improvement and how can ECFM be modified in relation to other standard factorization performance tasks?
In connection with security of databases or social networks in order to anonymize them the background knowledge of intruders is of enough importance. These knowledges need to be framed properly in order to make them a part of the anonymization process.
What are the different approaches followed in this connection? Any reference to source materials will be useful.
Muñoz, Lucio, 2003. Building the Basic Foundations of Global Sustainability, Sustainability Outlook, Warren Flint(PhD)(Ed), Issue 29/July, Washington DC, USA
We are excited to announce that the 13th International Symposium on Digital Forensics and Security (ISDFS 2025) will take place both online and in person at Wentworth Institute of Technology, Boston, Massachusetts, USA, on April 24-25, 2025. Since 2016, the IEEE has been a proud supporter of this symposium. Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.
ISDFS offers a platform for researchers and professionals from academia, industry, and government to exchange ideas and recent advancements in Digital Forensics, Cybersecurity, and Computer Science more broadly. Building on the success of the 12th event, the 13th ISDFS conference will continue to promote and share knowledge on various topics and technologies related to Digital Forensics and Cybersecurity. The symposium will feature a diverse program including special sessions, workshops, tutorials, keynote speeches, panel discussions, posters, and oral presentations.
Submissions will be reviewed by a minimum of two members of the Scientific Program Committee. Accepted papers will be submitted for inclusion in IEEE Xplore, provided they meet IEEE Xplore’s scope and quality standards. Papers must be written in English and formatted according to the IEEE guidelines. Submissions that do not adhere to the required format will be rejected, regardless of content quality.
The integration of IoT and blockchain technology offers powerful solutions for enhancing the security and transparency of global trade and investment. IoT devices can track shipments, monitor environmental conditions, and ensure that goods are transported safely, while blockchain provides an immutable ledger for recording transactions and verifying the authenticity of data.
This combination can address challenges such as fraud, delays, and lack of trust between trading partners. Blockchain ensures that data is tamper-proof, while IoT devices offer real-time monitoring, making the supply chain more efficient and secure. By using smart contracts, payments and other processes can be automated, reducing human intervention and ensuring smooth cross-border transactions.
This innovative approach not only streamlines logistics but also boosts confidence in global investments. Investors can trace the origin of goods, track performance metrics in real-time, and validate the credibility of their partners, resulting in more secure trade practices.
We, the Team Tech Wing, are actively working on IoT-driven blockchain solutions and are open to collaborations with like-minded innovators.
Target: Publishing in AIB's prestigious conference
Link: https://aib-southasia.org/wp-content/uploads/2024/09/AIB-Conference-January-2025.pdf#page=2.33
Regards
Kazi Redwan
Lead,
Team Tech Wing
As cloud service security becomes an increasingly critical concern, blockchain technology is emerging as a promising solution to enhance the protection of data and infrastructure. The intrinsic properties of blockchain, such as immutability and transparency, offer unique opportunities to ensure the traceability and integrity of transactions within cloud environments. We propose to explore various ways in which blockchain can be integrated into cloud architectures to improve security, while also considering the associated technological and organizational challenges. This topic is open for collaboration to deepen these research avenues and identify innovative solutions for implementation.
If you are interested in this topic, feel free to contact me for further discussion.
Could the central bank's historical record net loss for 2022, in the context of its monetary policy and speculative transactions in international financial markets, mean a decrease in security in the banking system?
The main purpose of a central bank's activities is to take care of the value of money, its stability against other currencies and the security of the banking system. However, since the 1970s, since the period of the rise of monetarism developed in accordance with Milton Fredman's concept of monetarism, the increase in the scale of economic globalisation, the transition of international monetary systems from the USD-based system, the system established after the Second World War in Bretton Woods to a system of free market exchange rates, the abandonment in the USA of gold parity with the USD currency, the growth of multinational corporations, the increased importance of speculative financial transactions carried out on foreign capital markets, including securities markets, etc. Central banks are also involved in the processes of stabilising the economy as part of anti-crisis programmes and protecting national labour markets, with the aim of limiting the scale of the increase in unemployment. In some countries, these new, additional central bank functions are added to the legal regulations shaping the functioning of the central bank. In some countries, the issue of linking the central bank's monetary policy is implemented informally.
For years, the central bank in Poland has also been conducting speculative transactions on international financial markets using various currencies and securities. For many previous years, the bank generated a net profit of PLN 9-10 billion of which 95 per cent of this profit was transferred to the state budget by the politically connected central bank to the government, instead of feeding the central bank's reserves and increasing the security of the financial system. For 2021, the central bank in Poland, i.e. the National Bank of Poland, generated as much as PLN 11 billion in net profit thanks to speculative transactions on the international financial markets, almost all of which went to the state budget rather than to central bank reserves, as usual. The annual profit generated by the central bank in Poland until 2021 was a consequence of, among other things, the monetary policy pursued by the bank, which consisted in successive depreciation of the domestic currency PLN against other currencies. However, for 2022, the National Bank of Poland unexpectedly raked in a historically record loss of PLN 17 billion. Could it be that the speculative transactions carried out in 2022 on the international financial markets turned out to be wrong this time? In addition, another key question arises: to what extent will this kind of situation result in a decrease in the level of security of the entire banking system?
In view of the above, I address the following question to the esteemed community of scientists and researchers:
Could the historically record net loss of the central bank for 2022, in the context of the monetary policy pursued and the speculative transactions carried out on the international financial markets, mean a decrease in security in the banking system?
And what is your opinion on this?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
Is the Zionist entity complying with Security Council resolutions on ending the occupation of the Palestinian territories?
Financial markets are platforms where individuals trade various financial instruments. it is divided into the following categories: the capital market and the money market. under the capital market are the bond market which is the government securities traded for a long term. and also the stock market which involves the trading of shares either from a primary or secondary market. Under the money market are the Repo markets which are also known as the overnight markets and also the Forex markets.
over the years, people remain ignorant about this information. how would a country, especially a developing country use financial markets to increase economic growth?
As the Internet of Vehicles (IoV) continues to expand, the exchange of sensitive data raises serious concerns about privacy and security. Blockchain can provide decentralized protection, while AI has the potential to improve threat detection and response. How can we combine Blockchain and AI in a practical way to better safeguard both privacy and security in IoV systems? Are there real-world examples or strategies that have been effective? And how can we refine these technologies to meet the evolving needs of connected vehicles in the future?
in H1 list w refer to word and h refer to hash of w and c refer to random coin but what about "a"?
Currently working on e-voting using cryptographic Techniques. I Would like to implement RSA and also to know how SHA works technically with RSA.
The degree of attack sophistication is going to significantly increase as bad actors leverage generative AI to create novel campaigns. It's not reasonable that each company can become an AI security specialty shop, so we're putting our trust in Abnormal to lead the way in that kind of advanced detection.”
— Karl Mattson, CISO, Noname Security
An Abnormal Approach to Stopping AI-Generated Attacks
- Ingests unique signals about employee behavior and vendor communication patterns that attackers can’t access with publicly available information.
- Trains AI models personalized for each organization to detect anomalous activity across internal users and external partners.
- Automatically remediates AI-generated attacks before employees can view or engage with them.
SOLUTION
How Abnormal Stops AI-Generated Attacks
- Employs NLP/NLU to detect fraudulent topics, tone, and sentiment, including urgency and formality.
- Detects unusual senders by understanding normal business relationships and communication patterns.
- Leverages the API architecture to ingest valuable behavior signals from M365, Okta, CrowdStrike, and multi-channel communication platforms.
I'm writing this post because there is limited help on how to use Mplus as a mac user (Catalina). This was a HUGE headache to figure out so I thought I would share...
Checking system preferences
Find the Mplus folder in your Applications folder. Double click on each of the following, and try to open all of them (diagrammer, mplus, mplus editor) one-by-one. If they don’t open, click on each of them one-by-one and add them under the system preference/security & privacy/GENERAL tab. Make sure this is done for the diagrammer, mplus, and mplus editor.
Then, click on the PRIVACY tab; and allow diagrammer, mplus, mplus editor to have full disk access, and access to files and folders.
Then click on startMplus, followed by: diagrammer, mplus, mplus editor (in any order)
Syntax and Data Files:
-You can use either .txt or .dat files EVEN on a mac!
-Save syntax and data files in same place (e.g., desktop)
.dat
-save .dat data file directly from your source
.txt
-copy and paste your numerical data into textedit, and save as plain text.
-format, ‘make plain text’, convert this text into plain text? Yes. If when you clicked format, it said ‘make rich text’, the file is already in the format you want it to be, so leave it alone.
-enter FILENAME.txt, include the .txt even if you have the box checked “if no file extension is provided, use “.txt”
Running files
Open Mplus Editor, click the folder and open the syntax file (FILE.inp).
Depending on whether you are using .dat or .txt enter this!
E.g.,
DATA:
FILE IS 'FILE.dat' ;
OR
DATA:
FILE IS 'FILE.txt' ;
Press run.
Save the output.
Good luck!
What interventions are most effective in helping adults with insecure attachment styles form secure relationships?
Knowledge of properties of illicit drugs in the microwave/low frequency parts of the millimetre wave band (10 GHz to 50 GHz) may at least enable a first line of defence in security screening of people. There's quite a few papers on signatures of these substances at higher frequencies (>300 GHz to 10 THz), where spectral features might be used for chemical identification. However, in the lower frequency part of the millimetre wave band, and microwave band there does not appear to very much information at all. So would anyone have any references to measurements in this lower frequency range?
It would also be useful to know about accurate and validated surrogates for illegal narcotics in the 10 GHz to 50 GHz band. So could anyone suggest surrogates for these materials, or at least papers on surrogates, as this would greatly ease measurements on these materials to investigate capabilities for security screening of people who might be carrying these substances?
Could anyone provide detailed methods or best practices for identifying security patches and backported commits in these libraries?
Any examples, particularly with TensorFlow, Pytorch and Hugging Face Transformers patches or backported datasets, would be highly appreciated. Additionally, if there are any hints or strategies to efficiently find backported commits across these libraries, that would be very helpful.
Thank you in advance for your insights and contributions!
What should a Mechanical Engineering PhD scholar focus on during their PhD to enhance their chances of securing a postdoctoral position?
Could the use of generative artificial intelligence technology to detect cybercrime attacks carried out using ransomware viruses significantly increase the level of cyber security in many companies, enterprises, financial and public institutions?
How can systems for managing the risk of cybercrime and/or loss of sensitive data archived in internal databases be improved through the use of generative artificial intelligence technology?
In a situation where companies, enterprises, financial and public institutions have a built in cybercrime risk management system, including email anti-spam applications, anti-virus systems, complex login tools, backap systems for data contained on hard drives, firewalls, cyber threat early warning systems, etc., then most cybercrime attacks targeting these business entities prove to be ineffective, and those that are effective cause very limited problems, financial losses, etc. However, there are still many business entities, especially companies and SMEs, that do not have complex, high-tech, integrated systems built to manage the risk of cybercrime and/or loss of sensitive data stored in databases. In recent years, one of the most serious cybercrime problems causing serious financial losses in some companies, enterprises, public institutions include cyberattacks used by cybercriminals with ransomware-type viruses. A successful attack carried out using ransomware viruses results in infecting a computer, blocking users, company employees from accessing the company's internal systems, stealing or blocking access to data collected in the company's databases, information stored on hard drives, etc., with a simultaneous demand to pay a ransom to remove the imposed blockades. In Poland, of the companies attacked with ransomware viruses, as many as 77 percent agree to pay the ransom. So security systems are still too poorly organized in many companies and institutions. In many business entities, systems for managing the risk of cybercrime and/or loss of sensitive data archived in internal databases are still not professionally built. Cybercrime risk management in many companies and enterprises apparently works poorly or not at all. Since generative artificial intelligence technology is being applied in many areas of cyber-security, so the question arises, could the application of this technology to detect cyber-crime attacks carried out with ransomware-type viruses significantly increase the level of cyber-security in many companies, enterprises, financial and public institutions?
I am conducting research in the problems of analyzing cybercriminal attacks conducted using ransomware viruses and in improving cyber security systems. I have included the conclusions of my research in the following articles:
Analysis of the security of information systems protection in the con-text of the global cyberatomy ransomware conducted on June 2, 2017
Development of malware ransomware as a new dimension of cybercrime taking control of IT enterprise and banking systems
Determinants of the development of cyber-attacks on IT systems of companies and individual clients in financial institutions
The Impact of the COVID-19 Pandemic on the Growing Importance of Cybersecurity of Data Transfer on the Internet
Cybersecurity of Business Intelligence Analytics Based on the Processing of Large Sets of Information with the Use of Sentiment Analysis and Big Data
THE QUESTION OF THE SECURITY OF FACILITATING, COLLECTING AND PROCESSING INFORMATION IN DATA BASES OF SOCIAL NETWORKING
I invite you to get acquainted with the issues described in the above-mentioned publications and to scientific cooperation in these issues.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How can cybercrime risk management systems and/or loss of sensitive data archived in internal databases be improved through the application of generative artificial intelligence technology?
Could the application of generative artificial intelligence technology to detect cyberattacks carried out using ransomware viruses significantly increase the level of cyber security in many companies, enterprises, financial and public institutions?
Can generative artificial intelligence technology help detect cybercrime attacks carried out using ransomware viruses?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
I read several information security books. How do I start writing anti-virus softwares ?
My Honors research question is "How can cryptographic techniques ensure the security and integrity of electronic voting systems?" Is it too broad?
Please I need your help to refine or come up with a good question.
Thank you
In today's global landscape, national security management requires effective communication strategies to navigate diverse challenges. Interdisciplinary approaches, focusing on communication and security, are vital for addressing complex threats. Communication plays a crucial role in disseminating information, coordinating responses, and building alliances. By integrating insights from various disciplines such as political science, sociology, and technology, national security agencies can enhance their capabilities. This involves leveraging communication tools and methodologies to foster collaboration, understand societal dynamics, and anticipate emerging risks. Ultimately, interdisciplinary communication strategies strengthen national security by fostering resilience, adaptability, and informed decision-making in an interconnected world.
The research question, focuses on addressing key challenges in Ghana's security governance. Recent security incidents in Ghana have highlighted the critical importance of effectively communicating security-related information to the public. Despite the necessity for citizen involvement in security governance, there is a notable gap in public understanding and engagement with security issues. This gap is largely attributed to a lack of knowledge about security matters among Ghanaians, which undermines their participation in national security processes. The question seeks to explore strategies that can improve the dissemination of security-related communication to enhance citizen awareness and encourage active participation in shaping and supporting national security efforts.
Is it safe to apply generative artificial intelligence technology in conjunction with Big Data and other Industry 4.0/5.0 technologies to support the development of nuclear technology?
On the one hand, the development of modern and safe nuclear power technology is needed especially in the situation of creating an important source of electricity as an intermediate step in the green transformation of the energy sector, which consists of shifting power generation based mainly on emission-intensive fossil fuel combustion to clean power generation based on emission-free, fully renewable energy sources. The application of new Industry 4.0/5.0 technologies, including but not limited to machine learning, deep learning, generative artificial intelligence, Big Data Analytics, multi-criteria simulation models, Internet of Things, Blockchain, digital twins, cloud computing, autonomous robots, etc., enables the generation of new innovative solutions, improvement of applications and safety systems of energy technologies, including nuclear energy technologies. Besides, thanks to the application of the above-mentioned technologies, there are new opportunities for optimization both in the design and implementation of investment projects for the construction of new power plants and optimization in the processes of managing energy production from various energy sources within the applied mix of energy sources, taking into account the changing conditions of energy consumption, forecasting changes in energy demand in the future, changes in the economic environment, climatic conditions and other factors modeling changes in energy production from various energy sources, including those that depend on specific atmospheric and climatic conditions such as wind and solar power.
However, on the other hand, the application of Industry 4.0/5.0 technologies, including primarily generative artificial intelligence in improving technology development processes, supporting research processes, supporting management processes, etc. concerning nuclear technology, including nuclear technology applied in fields other than energy, i.e., e.g., medicine, geology, construction analytics, etc., and in the military field, may generate various kinds of very serious risks.
A cinematic vision of the kind of risks that can result from the application of artificial intelligence technology in the military sphere, including in terms of supporting the management processes of military systems taking into account ballistic missiles equipped with nuclear payloads, i.e. carried by transcontinental missiles and/or launched from submarines and strategic bombers was presented many years ago in films of the drama, thriller and at the same time science fiction genre, such as the 1983 film titled “War Games”, directed by John Badham, and the continuation of this theme in a similar film titled “War Games: The Code of Death”. “War Games: Code of Death” from 2008, directed by Stuart Gillard.
In view of the above, for at least 4 decades now, there have been considerations about the serious risks arising from the application of artificial intelligence technology in the field of computerized weapons management systems, in the field of military defense of the country, including with regard to nuclear weapons.
In view of the above, in view of the fact that the application of Industry 4.0/5.0 technologies, including, first of all, generative artificial intelligence in the military field can generate various kinds of very serious risks so it is still topical to consider the validity and scope of optimal, safe application of AI technologies in this field.
I described the key issues of opportunities and threats to the development of artificial intelligence technology in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
I described the applications of Big Data technologies in sentiment analysis, business analytics and risk management in my co-authored article:
APPLICATION OF DATA BASE SYSTEMS BIG DATA AND BUSINESS INTELLIGENCE SOFTWARE IN INTEGRATED RISK MANAGEMENT IN ORGANIZATION
I described the key issues concerning the problem of green transformation of the economy in the following article:
IMPLEMENTATION OF THE PRINCIPLES OF SUSTAINABLE ECONOMY DEVELOPMENT AS A KEY ELEMENT OF THE PRO-ECOLOGICAL TRANSFORMATION OF THE ECONOMY TOWARDS GREEN ECONOMY AND CIRCULAR ECONOMY
I invite you to discuss this important topic for the future of the planet's biosphere and climate.
The key issues of the problematic sources of Poland's exceptionally deep energy cross in 2022 are described in my co-authored article below:
POLAND'S 2022 ENERGY CRISIS AS A RESULT OF THE WAR IN UKRAINE AND YEARS OF NEGLECT TO CARRY OUT A GREEN TRANSFORMATION OF THE ENERGY SECTOR
In view of the above, I address the following question to the esteemed community of scientists and researchers:
Is it safe to apply generative artificial intelligence technology in conjunction with Big Data and other Industry 4.0/5.0 technologies to support the development of nuclear technology?
Is it safe to apply generative artificial intelligence technology in the development of nuclear technology?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
Context
In the realm of cybersecurity, Transport Layer Security (TLS) is widely used to secure communications over a computer network. Despite its robust encryption mechanisms, TLS is still susceptible to Man-in-the-Middle (MitM) attacks under certain conditions. A MitM attack involves an attacker secretly intercepting and possibly altering the communication between two parties who believe they are directly communicating with each other.
- What are the indicators of a potential MitM attack in a TLS-secured environment?
- Discuss any tools or methodologies used to detect MitM attacks.
what are novel cryptographic protocols that enhance email security?
To what extent has the scale of disinformation generated with the use of applications available on the Internet based on generative artificial intelligence technology increased?
To what extent has the scale of disinformation generated in online social media increased using applications based on generative artificial intelligence technology available on the Internet?
Many research institutions have included among the main types of threats and risks developing globally in 2023 the question of the increase in the scale of organized disinformation operating in online social media. The diagnosed increase in the scale of disinformation generated in online social media is related to the use of applications available on the Internet based on generative artificial intelligence technology. With the help of applications available on the Internet, it is possible without being a computer graphic designer and even without artistic skills to simply and easily create graphics, drawings, photos, images, videos, animations, etc., which can represent graphically professionally created “works” that can depict fictional events. Then, with the help of other applications equipped with generative artificial intelligence technology and advanced language models, i.e. with the help of intelligent chatbots, text can be created to describe specific “fictional events” depicted in the generated images. Accordingly, since the end of 2022, i.e. since the first such intelligent chatbot, i.e. the first versions of ChatGPT, were made available on the Internet, the number of memes, photos, comments, videos, posts, banners, etc. generated with the help of applications equipped with tools based on artificial intelligence technology has been growing rapidly, including the rapid increase in the scale of disinformation generated in this way. In order to limit the scale of the aforementioned disinformation developing in online media, on the one hand, technology companies running social media portals and other online information services are perfecting tools for identifying posts, entries, comments, banners, photos, videos, animations, etc. that contain specific, usually thematic types of disinformation. However, these solutions are not perfect, and the scales of disinformation operating in internecine social media are still high. On the other hand, specific institutions for combating disinformation are being established, NGOs and schools are conducting educational campaigns to make citizens aware of the high scale of disinformation developing on the Internet. In addition, proposed regulations such as the AIAct, which as a set of regulations on the proper use of tools equipped with artificial intelligence technology is expected to come into force in the next 2 years in the European Union may play an important role in reducing the scale of disinformation developing on the Internet.
I have described the key issues of opportunities and threats to the development of artificial intelligence technology in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
To what extent has the scale of disinformation generated in online social media using applications based on generative artificial intelligence technology available on the Internet increased?
To what extent has the scale of disinformation generated using applications based on generative artificial intelligence technology available on the Internet increased?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
How to fill the growing gap in energy production in a situation where combustion energy dominates, RES are little developed and nuclear energy is still not developed?
With what to fill the growing gap of lack of energy production in a situation where expensive energy sources based on combustion of fossil fuels still prevail, the price of energy produced from RES is steadily falling and the chaotic and short-sighted energy policy does not take into account the construction of nuclear power plants or plans to build the first nuclear power plants only in 2 decades time?
Due to economic development, including the development of energy-intensive industries and services, the demand for electricity is gradually increasing.
In addition, the development of electromobility is becoming an important factor in the growth of electricity demand. With the developing economy becoming a knowledge-based economy, an information economy, an economy in which the scale of implementation of new ICT, Industry 4.0/5.0, including the development of data centers using Big Data Analytics, artificial intelligence, cloud computing, Blockchain, etc. is growing rapidly, then in addition, the demand for energy is also growing rapidly. Another factor that is already increasing and will continue to increase the demand for electricity in the future is the process of ongoing global warming resulting in increased use of cooling equipment. On the other hand, the pace of energy development, including, first and foremost, energy that meets the guidelines of climate policy based on renewable and emission-free energy sources is not sufficient.
As a result, the energy deficit gap is growing every year, and will unfortunately continue to grow in the coming years unless appropriate reforms are undertaken and the green transformation processes of the energy sector are accelerated. In addition, the importance of this issue is particularly high in countries where types of energy sources such as nuclear power are underdeveloped or not developed at all is particularly important. Nuclear power is the type of energy sources that can act as an intermediate stage in the process of green transformation of the economy involving the replacement of conventional energy sources based on the combustion of fossil fuels with fully emission-free, climate and environmentally clean energy sources. In addition, countries where, for geographical, natural and geological reasons, it may be difficult to develop certain types of renewable energy such as limited opportunities for the construction of hydroelectric power plants due to the small scale of diversity in terms of terrain, few rivers and certain geological reasons, have a difficult situation in the implementation of the process of green transformation of the economy. A significant further factor not conducive to reducing the scale of the growing energy deficit gap may be the unreliable, short-sighted, haphazard, non-strategic energy, climate and environmental policies, in which there are even situations of limiting and/or blocking the development of certain types of renewable and carbon-free energy sources. An example is the blocking of the development of onshore wind energy in Poland in 2016 through the introduction of Law 10h, resulting in a strong increase in coal imports and a significant slowdown in the green energy transition. The result is that Poland's energy production is still significantly dominated by conventional power generation based on the combustion of fossil fuels, mainly coal and lignite, which accounts for more than 70 percent of Poland's total energy production. Paradoxically, even this relatively small share of RES power generation can, under favorable natural and climatic conditions, provide more than the usual amount of energy, much of which is wasted because it is not accepted by the dominant power industry, including government-controlled energy companies functioning as state-owned companies. The argument that is given by these large power companies to this anachronistic, irrational situation is the years-long lack of investment in the development of electricity transmission networks. Paradoxically, over the past 3 decades of time, most of the funds coming from the state's public finance system have been allocated to subsidizing unprofitable coal and lignite mines and maintaining the power plants where the aforementioned coal is burned.
The reason that in the past the development of renewable and emission-free sources of energy has been limited and even blocked is that nowadays there are more and more absurd situations of sorts, where during sunny and windy weather from prosumers, photovoltaic panels and household wind turbines installed by citizens on the roof of their homes, there is an above-average increase in electricity production, but all the energy generated is not used by energy companies due to the lack of adequately developed infrastructure of transmission networks and the lack of established energy storage facilities, batteries, a significant part of the energy generated from RES goes to waste, and in other months it happens to buy energy from other countries, when there is a periodic shortage of energy due to the growing demand for energy. The paradox and economic irrationality of this situation also lies in the fact that energy prices are steadily rising, and the cheapest sources of energy generated from wind and solar power are too slowly being developed.
As a result, energy policy, and also climate and environmental policy, in the country where I operate is being conducted chaotically, strategically and short-sightedly. The guidelines of the European Union's Green Deal are largely ignored, and this is despite the available financial subsidies from the European Union, which should be allocated to the green transformation of the energy sector. In addition, subsidies for combustion power generation based mainly on coal and lignite continue to dominate, which translates into high energy prices, poor air quality and the postponement of the implementation of the plan to build a sustainable, green, zero-emission closed-loop economy, an essential element of which is to build a zero-emission power industry based on RES.
In addition, there is almost no research, analysis and implementation work on new innovative energy technologies such as those based on hydrogen power technology, cold fusion technology, etc.
I am conducting research in this area. I have included the conclusions of my research in the following article:
IMPLEMENTATION OF THE PRINCIPLES OF SUSTAINABLE ECONOMY DEVELOPMENT AS A KEY ELEMENT OF THE PRO-ECOLOGICAL TRANSFORMATION OF THE ECONOMY TOWARDS GREEN ECONOMY AND CIRCULAR ECONOMY
The key issues of the problematic sources of Poland's exceptionally deep energy cross in 2022 are described in my co-authored article below:
POLAND'S 2022 ENERGY CRISIS AS A RESULT OF THE WAR IN UKRAINE AND YEARS OF NEGLECT TO CARRY OUT A GREEN TRANSFORMATION OF THE ENERGY SECTOR
I invite you to study the problems described in the above-mentioned publications and scientific cooperation in this issue.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
What to fill the growing gap of lack of electricity production in a situation where expensive energy sources based on burning fossil fuels still prevail, the price of energy generated from RES is steadily falling and the chaotic and short-sighted energy policy does not include the construction of nuclear power plants or plans to build the first nuclear power plants only in 2 decades of time?
With what to fill the growing gap in energy production in a situation where combustion power dominates, RES are little developed and nuclear power is still not developed?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
This question challenges the traditional foundation of international relations theory - the concept of national interest. It proposes a novel framework that moves beyond state-centric thinking and prioritizes collective goals for a healthy planet and human flourishing. Analyzing international cooperation through this lens would involve:
- Redefining Security: Security wouldn't just be about protecting national borders, but about ensuring global environmental and social security.
- Measuring Success: Indicators of progress wouldn't just be economic growth or military strength, but metrics reflecting ecological health, poverty reduction, and global cooperation.
- Emerging Governance: Exploring alternative models of international governance that prioritize global well-being, potentially involving greater power for supranational organizations or innovative forms of participatory democracy on a global scale.
The question aims to explain the basic interconnection of international security in relation to the concept of balance of power
With respect to Data Integrity and Confidentiality (Data Breaches).
Hello all,
I am currently doing my master degree programme in applied informatics and I would like to do master thesis related to DevOps or could be also Cloud native apps (ideally both focused on security ).
Im searching for some new and really reserach-worth topic but i find it hard to come up with some topic in this domain. I came up with some topics but unfortunately most of them are already published.
Can anyone help me please with topics along this path ?
Thanks
Šimon Zajac
Hello Everyone!
I'm currently pursuing a Master of Science in Finance and am in search of research topic suggestions that align with my degree. However, my primary interest lies in the field of cybersecurity, specifically focusing on compliance, risk management, and governance (GRC), as well as offensive security. I aim to undertake a project that deeply integrates these interests within the finance domain.
I would greatly appreciate any recommendations or guidance on potential topics.
Thank you
In the security proof of CVQKD, it requires that the protocol is invariant under unitary transformations in phase-space. How to make a protocol satisfy unitary operation invariance?
I am a research student and wanted to do a research in Blockchain-based security in Cloud Computing but my topic was thrown out because it was not specific. However, I have been thinking of how to coin my research topic to suit what my supervisors expect. I therefore need help in this regard.
I want to work in the novel area of integrating Blockchain technology in cloud computing to take care of security challenges (like cybercrime) based on research gaps from previous researchers.
Best regards,
Enuma Charles
كيف يمكن الموازنة بين رقمنة الادارة و أمن المعلومات؟
"In what ways might the integration of IoT confront apprehensions surrounding data confidentiality and security, specifically concerning the acquisition, retention, and conveyance of confidential data?"
Hello colleagues! What sections of information security relate to classified data from the position of publication? And is there liability in your countries for their disclosures in publications?
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which previously employees of these entities enter into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
Despite the training and updating of internal rules and regulations in many companies and enterprises regarding the proper use of intelligent chatbots, i.e., for example, the ChatGPT made available online by OpenAI and other similar intelligent applications that more technology companies are making available on the Internet, there are still situations where reckless employees enter sensitive data of the companies and enterprises where they are employed into these online tools. In such a situation, there is a high risk that the data and information entered into ChatGPT, Copilot or any other such chatbot may subsequently appear in a reply, an edited report, essay, article, etc. by this application on the smartphone, laptop, computer, etc. of another user of the said chatbot. In this way, another Internet user may accidentally or through a deliberate action of searching for specific data come into possession of particularly important, key, sensitive data for a business entity, public institution or financial institution, which may concern, for example, confidential strategic plans, i.e., information of great value to competitors or intelligence organizations of other countries. This kind of situation has already happened and occurred in some companies characterized by highly recognizable brands in specific markets for the sale of products or services. Such situations clearly indicate that it is necessary to improve internal procedures for data and information protection, improve issues of efficiency of data protection systems, early warning systems informing about the growing risk of loss of key company data, and improve systems for managing the risk of potential leakage of sensitive data and possible cybercriminal attack on internal company information systems. In addition, in parallel to improving the aforementioned systems that ensure a certain level of data and information security, internal regulations should be updated on an ongoing basis according to the scale of the risk, the development of new technologies and their implementation in the business entity, with regard to the issue of correct use by employees of chatbots available on the Internet. In parallel, training should be conducted, during which employees learn about both new opportunities and risks arising from the use of new applications and tools based on generative artificial intelligence technology made available on the Internet. Another solution to this problem may be to order the company to completely ban employees from using smart chatbots made available on the Internet. In such a situation, the company will be forced to create its own, operating as internal such applications and intelligent chatbots, which are not connected to the Internet and operate solely as integral modules of the company's internal information systems. This type of solution will probably involve the company incurring significant financial expenses as a result of creating its own such IT solutions. The costs can be significant and many small companies' financial barrier can be high. However, on the other hand, if the construction of internal IT systems equipped with their own intelligent chatbot solutions becomes an important element of competitive advantage over key direct competitors, the mentioned financial expenses will probably be considered in the category of financial resources allocated to investment and development projects that are important for the future of the company.
The key issues of opportunities and threats to the development of artificial intelligence technology are described in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which employees of these entities previously input into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
How do you mitigate the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz
My research is on Physical, Logical and Cyber-Persona Layers of cyberspace. I have to include what security threats can impact multiple layers.
Brief summary of risks and security breaches while hosting information and applications on the cloud.
Is there a connection between Fake News and Campus Security as it relates to academic programs and safety of academic staffs, students, non academic staff and campus visitors.
In 2024, the 5th International Conference on Computer Communication and Network Security (CCNS 2024) will be held in Guangzhou, China from May 3 to 5, 2024.
CCNS was successfully held in Guilin, Xining, Hohhot and Qingdao from 2020 to 2023. The conference covers diverse topics including AI and Machine Learning, Security Challenges in Edge Computing, Quantum Communication Networks, Optical Fiber Sensor Networks for Security, Nano-Photonic Devices in Cybersecurity and so on. We hope that this conference can make a significant contribution to updating knowledge about these latest scientific fields.
---Call For Papers---
The topics of interest for submission include, but are not limited to:
Track 1: Computer Communication Technologies
AI and Machine Learning
Blockchain Applications in Network Defense
Security Challenges in Edge Computing
Cybersecurity in 5G Networks
IoT Security Protocols and Frameworks
Machine Learning in Intrusion Detection
Big Data Analytics for Cybersecurity
Cloud Computing Security Strategies
Mobile Network Security Solutions
Adaptive Security Architectures for Networks
Track 2: Advanced Technologies in Network Security
Quantum Communication Networks
Photonics in Secure Data Transmission
Optical Fiber Sensor Networks for Security
Li-Fi Technologies for Secure Communication
Nano-Photonic Devices in Cybersecurity
Laser-Based Data Encryption Techniques
Photonic Computing for Network Security
Advanced Optical Materials for Secure Communication
Nonlinear Optics in Data Encryption
Optical Network Architectures for Enhanced Security
All papers, both invited and contributed, will be reviewed by two or three expert reviewers from the conference committees. After a careful reviewing process, all accepted papers of CCNS 2024 will be published in SPIE - The International Society for Optical Engineering (ISSN: 0277-786X), and indexed by EI Compendex and Scopus.
Important Dates:
Full Paper Submission Date: March 17, 2024
Registration Deadline: April 12, 2024
Final Paper Submission Date: April 21, 2024
Conference Dates: May 3-5, 2024
For More Details please visit:
Invitation code: AISCONF
*Using the invitation code on submission system/registration can get priority review and feedback
With reference to banking security framework and operational security standards
The recognition process of all types of biometrics relies on the probabilistic judgment of variable physical and / or behavioral features of human beings. However, an authentication system requires the recognition result from authenticating the right person deterministically. But, biometrics recognition is inherently probabilistic and hence unreliable. Biometrics recognition can not yield a deterministic "yes/no" result as text passwords/PINs. Thus, biometrics can lower security.
I'm writing a dissertation on the topic Security and Law: Legal and Ethical aspects of cybersecurity, public security and critical infrastructure security. Please answer keeping cybersecurity in focus vis-a-vis public security and critical infrastructure security.
give me conceptual literature, foreign studies, local studies, and theoretical framework about Adoption of Online Security Practices among Residents of Iloilo City?
While integrating manufacturing design, Industrial Revolution 4.0, and Lean Manufacturing can bring significant benefits but there are also challenges and problems that can arise in the process in term of Data Privacy and Security. How we can solve this problems?
I am a PhD student and I want to create a secure document verification solution using blockchain technologyn? I identified various security parameters for my research like authencation,key management,access permission,atomicity,smart contract security .Coul you please tell me these parameters are correct or not?
Here are some additional questions that may help answer the main question on the subject:
• What are the existing problems with the accessibility, efficiency, security, and user-friendliness of blockchain and smart contracts?
• How do we need to design and develop smart contracts to ensure further adoption and continuous improvement of this technology?
• What technologies can we leverage to enable smart contracts with the potential to transform more traditional processes across industries, offering benefits to individuals, businesses, and communities?
• What kind of users need to gain access to smart contracts? In what situations?
• What other characteristics of smart contracts can we consider?
#research #question #researchquestion #smartcontract #smartcontracts #smartlegalcontracts #blockchain #laws #regulations #tech #technology #governance #emergingtech #ai #accessibility #efficiency #security #userfriendliness
I have a paper that is coming up and I need to figure out a ”how” or “why” research question that is related to international security and U.S.-China relations but it has to be something that has never been researched on before. There needs to be a research gap, why it is puzzling and interesting, and what my thesis would be to it. Can you help me by listing some questions that have never been done before?
Why don't the companies running social networking sites that make money from ads posted on their social media bear full responsibility for the content of the ads posted and for the financial, social, moral and other damages caused by ads that are not properly verified?
In today's most popular online social media, there have recently been many untrustworthy advertisements for various products and services, including misleading ads presenting false, unreliable, fraudulent offers of pseudo financial services. Often beginners or experienced influencers and youtubers play the role of presenting certain offers. Sometimes the people presenting certain untrustworthy offers of products or services are seemingly random people who, seemingly as mere citizens of the Internet who want to share their experiences of using various offers, presenting mainly or exclusively positive aspects of using certain presented products and services in reality are paid by the companies whose offers they present. Sometimes influencers and youtubers are given ownership of a specific advertised product for free as a form of gratification. In addition, artificial intelligence technology is increasingly being used to create advertising spots broadcast on social media. Individuals and companies using generative artificial intelligence technology, including applications based on AI technology available for free on the Internet to create advertising spots are taking advantage of legal loopholes, i.e. the lack of legal regulations that would normalize this sphere of the use of AI technology and limit the scale of misinformation, generation of fejknews, untrustworthy advertisements presenting various product and service offers using misleading content to the public that is inconsistent with facts, unverified using reliable, objective expert knowledge, scientific research conducted, etc. In addition, in AI-generated spots, animations and advertising videos, more and more often, instead of human influencers and youtubers, there are replacing them with a kind of avatars, digitally generated people who do not exist in reality. It happens that digitally generated images of real existing public figures of politicians, athletes, showbiz people, actors, singers, etc. are used in unreliably generated spots, animations and advertising videos, into whose mouths are put statements, texts, words that in reality they have never spoken. Recently, more and more often in the online social media, in which there are certain segments, generations of Internet users, citizens, there are many unreliable, taking advantage of the low level of knowledge in the field, offers of pseudo financial services, offers of supposedly super easy and highly profitable investments in cryptocurrencies, in miraculous investment strategies in Bitcoin requiring virtually no knowledge of finance, extra unique investment offers in precious metals, in contracts on selected securities, shares of dynamically growing startups basing their development on artificial intelligence technology, conducting innovative research projects with the aim of creating a miracle cure for cancer or other difficult-to-treat or incurable diseases. Public organizations and institutions representing the interests of consu