Abstract
25 years ago, when AI & Society was launched, the emphasis was, and still is, on dehumanisation and the effects of technology on human life, including reliance on technology. What we forgot to take into account was another very great danger to humans. The pervasiveness of computer technology, without appropriate security safeguards, dehumanises us by allowing criminals to steal not just our money but also our confidential and private data at will. Also, denial-of-service attacks prevent us from accessing the information we need when we want it. We are being dehumanised not by the technology but by criminals who use the ubiquity of the technology and its lack of security to steal from us and prevent us from doing what we want. What is more interesting is that this malevolent use of the technology doesn’t come from monolithic corporate structures eager to control our lives but mainly from individuals keen to demonstrate their knowledge of the technology for social networking purposes. The aim of this paper is to turn the clock back 25 years and present an alternative perspective: the single, biggest threat of dehumanisation is not the pervasiveness and ubiquity of computers but the lack of ensuring that humans are provided with the basic security they need for using the technology safely and securely. Cyberspace is not a safe space to be. This was something that even far-sighted researcher colleagues in the 1970s and 1980s overlooked. The paper will explore where we went wrong 25 years ago in our predictions and concerns. We will also present a scenario that allows future generations to have a safer cyberworld.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Adams R (2004) Intelligent advertising. AI Soc 18:68–81
Ahmad W, Narayanan A (2010) Humoral artificial immune system (HAIS) for supervised learning. In: Proceedings of NaBIC2010 (IEEE world congress on nature and biologically inspired computing), pp 37–44, Kitakyushu, Japan
Baranetsky V (2009) What is cyberterrorism? Even experts can’t agree. Harvard Law Record. 5 Nov 2009. Available from http://www.hlrecord.org/news/what-is-cyberterrorism-even-experts-can-t-agree-1.861186
Bishop M (2011) Computer Security Archives Project. http://seclab.cs.ucdavis.edu/projects/history/
Botnets prove resilient another year on. MessageLabs Intelligence 2010 Annual Security Report. http://www.clearnorthtech.com/images/MessageLabsIntelligence_2010_Annual_Report.pdf
Castro LN de, Zuben J (2000) The clonal selection algorithm with engineering applications. In: Proceedings of GECCO, workshop on artificial immune systems and their applications, Las Vegas, pp 36–42
Dasgupta D, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: Proceedings of the IEEE congress on evolutionary computation (CEC), pp 123–130, Canberra, Australia
Demillo RA, Dobkin DP, Jones AK, Lipton RJ (1978) Foundations of secure computation. Academic Press, New York
Denning PJ, Comer DE, Gries D, Mulder MC, Tucker A, Turner AJ, Young PR (1989) Computing as a discipline. CACM 32(1):9–23
European Commission Directorate-General for Justice (2011) Protection of personal data. http://ec.europa.eu/justice/data-protection/index_en.htm
Forrest B (2007) Understanding the intelligent design creationist movement: its true nature and goals. Position Paper from the Center for Inquiry Office of Public Policy. Available from http://www.centerforinquiry.net/uploads/attachments/intelligent-design.pdf
Forrest S, Hofmeyer S (2000) Immunology as information processing. In: Segel L, Cohen I (eds) Design principles for immune system and other distributed autonomous systems. Oxford University Press, Oxford, pp 361–387
Gill K (1987) Editorial. AI Soc 1:3–4
Graves K (2010) CEH certified ethical hacker study guide. Wiley, Indianapolis
Guttman B, Roback E (1995) An introduction to computer security: the NIST handbook. US Department of Commerce NIST Special Publication 800-12. Available from books.google.com.
Hunt JE, Cook DE (1996) Learning using an artificial immune system. J Netw Comput Appl 19:189–212
Mallard S (2011) How do hackers think? http://www.brighthub.com/computing/enterprise-security/articles/5299.aspx
Malware costs U.S. consumers $2.3 billion a year (2011) 11 May. http://news.consumerreports.org/electronics/2011/05/malware-costs-us-consumers-23-billion-a-year.html
Strickland J (2011) Ten worst computer viruses of all time. How Stuff Works. http://computer.howstuffworks.com/worst-computer-viruses1.htm
Symantec Internet Security Threat Report: Trends for 2010. Vol 16 (Apr 2011). Available from http://www.symantec.com/business/threatreport/index.jsp
Timmis J, Knight T (2001) Aine: an immunological approach to data mining. In: Cercone L, Lin T, Wu X (eds) IEEE international conference on data mining, pp 297–304, San Jose, CA, USA
Why Traditional Anti-Malware Solutions Are No Longer Enough (2009) AVG Technologies White Paper. Available from http://www.avg.com.au/files/media/pf_wp-90_A4_us_z3162_20091112.pdf
Zetter K (2009) Nov. 10, 1983: computer ‘virus’ is born. Wired. 10 Nov 2009. http://www.wired.com/thisdayintech/2009/11/1110fred-cohen-first-computer-virus/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Narayanan, A. Society under threat… but not from AI. AI & Soc 28, 87–94 (2013). https://doi.org/10.1007/s00146-012-0401-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00146-012-0401-7