{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T01:29:55Z","timestamp":1656293395245},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,2,16]],"date-time":"2012-02-16T00:00:00Z","timestamp":1329350400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AI & Soc"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1007\/s00146-012-0401-7","type":"journal-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T11:47:17Z","timestamp":1329306437000},"page":"87-94","source":"Crossref","is-referenced-by-count":3,"title":["Society under threat\u2026 but not from AI"],"prefix":"10.1007","volume":"28","author":[{"given":"Ajit","family":"Narayanan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,16]]},"reference":[{"key":"401_CR1","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/s00146-003-0259-9","volume":"18","author":"R Adams","year":"2004","unstructured":"Adams R (2004) Intelligent advertising. AI Soc 18:68\u201381","journal-title":"AI Soc"},{"key":"401_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad W, Narayanan A (2010) Humoral artificial immune system (HAIS) for supervised learning. In: Proceedings of NaBIC2010 (IEEE world congress on nature and biologically inspired computing), pp 37\u201344, Kitakyushu, Japan","DOI":"10.1109\/NABIC.2010.5716297"},{"key":"401_CR3","unstructured":"Baranetsky V (2009) What is cyberterrorism? Even experts can\u2019t agree. Harvard Law Record. 5 Nov 2009. Available from http:\/\/www.hlrecord.org\/news\/what-is-cyberterrorism-even-experts-can-t-agree-1.861186"},{"key":"401_CR4","unstructured":"Bishop M (2011) Computer Security Archives Project. http:\/\/seclab.cs.ucdavis.edu\/projects\/history\/"},{"key":"401_CR5","unstructured":"Botnets prove resilient another year on. MessageLabs Intelligence 2010 Annual Security Report. http:\/\/www.clearnorthtech.com\/images\/MessageLabsIntelligence_2010_Annual_Report.pdf"},{"key":"401_CR6","unstructured":"Castro LN de, Zuben J (2000) The clonal selection algorithm with engineering applications. In: Proceedings of GECCO, workshop on artificial immune systems and their applications, Las Vegas, pp 36\u201342"},{"key":"401_CR7","unstructured":"Dasgupta D, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: Proceedings of the IEEE congress on evolutionary computation (CEC), pp 123\u2013130, Canberra, Australia"},{"key":"401_CR8","unstructured":"Demillo RA, Dobkin DP, Jones AK, Lipton RJ (1978) Foundations of secure computation. Academic Press, New York"},{"issue":"1","key":"401_CR9","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/63238.63239","volume":"32","author":"PJ Denning","year":"1989","unstructured":"Denning PJ, Comer DE, Gries D, Mulder MC, Tucker A, Turner AJ, Young PR (1989) Computing as a discipline. CACM 32(1):9\u201323","journal-title":"CACM"},{"key":"401_CR10","unstructured":"European Commission Directorate-General for Justice (2011) Protection of personal data. http:\/\/ec.europa.eu\/justice\/data-protection\/index_en.htm"},{"key":"401_CR11","unstructured":"Forrest B (2007) Understanding the intelligent design creationist movement: its true nature and goals. Position Paper from the Center for Inquiry Office of Public Policy. Available from http:\/\/www.centerforinquiry.net\/uploads\/attachments\/intelligent-design.pdf"},{"key":"401_CR12","unstructured":"Forrest S, Hofmeyer S (2000) Immunology as information processing. In: Segel L, Cohen I (eds) Design principles for immune system and other distributed autonomous systems. Oxford University Press, Oxford, pp 361\u2013387"},{"key":"401_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF01905884","volume":"1","author":"K Gill","year":"1987","unstructured":"Gill K (1987) Editorial. AI Soc 1:3\u20134","journal-title":"AI Soc"},{"key":"401_CR14","unstructured":"Graves K (2010) CEH certified ethical hacker study guide. Wiley, Indianapolis"},{"key":"401_CR15","doi-asserted-by":"crossref","unstructured":"Guttman B, Roback E (1995) An introduction to computer security: the NIST handbook. US Department of Commerce NIST Special Publication 800-12. Available from books.google.com.","DOI":"10.6028\/NIST.SP.800-12"},{"key":"401_CR16","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1006\/jnca.1996.0014","volume":"19","author":"JE Hunt","year":"1996","unstructured":"Hunt JE, Cook DE (1996) Learning using an artificial immune system. J Netw Comput Appl 19:189\u2013212","journal-title":"J Netw Comput Appl"},{"key":"401_CR17","unstructured":"Mallard S (2011) How do hackers think? http:\/\/www.brighthub.com\/computing\/enterprise-security\/articles\/5299.aspx"},{"key":"401_CR18","unstructured":"Malware costs U.S. consumers $2.3 billion a year (2011) 11 May. http:\/\/news.consumerreports.org\/electronics\/2011\/05\/malware-costs-us-consumers-23-billion-a-year.html"},{"key":"401_CR19","unstructured":"Strickland J (2011) Ten worst computer viruses of all time. How Stuff Works. http:\/\/computer.howstuffworks.com\/worst-computer-viruses1.htm"},{"key":"401_CR20","unstructured":"Symantec Internet Security Threat Report: Trends for 2010. Vol 16 (Apr 2011). Available from http:\/\/www.symantec.com\/business\/threatreport\/index.jsp"},{"key":"401_CR21","doi-asserted-by":"crossref","unstructured":"Timmis J, Knight T (2001) Aine: an immunological approach to data mining. In: Cercone L, Lin T, Wu X (eds) IEEE international conference on data mining, pp 297\u2013304, San Jose, CA, USA","DOI":"10.1109\/ICDM.2001.989532"},{"key":"401_CR22","unstructured":"Why Traditional Anti-Malware Solutions Are No Longer Enough (2009) AVG Technologies White Paper. Available from http:\/\/www.avg.com.au\/files\/media\/pf_wp-90_A4_us_z3162_20091112.pdf"},{"key":"401_CR23","unstructured":"Zetter K (2009) Nov. 10, 1983: computer \u2018virus\u2019 is born. Wired. 10 Nov 2009. http:\/\/www.wired.com\/thisdayintech\/2009\/11\/1110fred-cohen-first-computer-virus\/"}],"container-title":["AI & SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-012-0401-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00146-012-0401-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-012-0401-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,2]],"date-time":"2020-07-02T12:57:18Z","timestamp":1593694638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00146-012-0401-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,16]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["401"],"URL":"https:\/\/doi.org\/10.1007\/s00146-012-0401-7","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,16]]}}}