<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alfredo M. Ronchi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Human Factor, Resilience, and Cyber/Hybrid Influence</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberwarfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">soft concerns</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">221-239</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The aim of this article is to depict some of the impacts of the ongoing digital transition on security, considering human factors, resilience, cyber and hybrid threats. After a short description of literature and related works, the article focuses on the term “security” to better clarify the meaning, then introduces the process of digital transition and related aspects including “datafication” and potential harms to cybersecurity and the potential resilience breaches due to the concentration of tasks based on digital technology including production chains and digital manufacturing.
Recently, the digital transformation has had a considerable impact on cybersecurity due to the boost generated by the pandemic and the increasing number of “digitally divided” citizens forced to “go digital” and related need to foster a culture of cybersecurity since the primary schools. This section includes an overview of different approaches to the “securitisation” of cyberspace. Back to security in a broad sense freedom of expression is the first aspect considered, including hate, fake news and propaganda, influence on opinion dynamics potentially applicable to the social and political sectors, as a kind of technological extension the combined use of big data and machine learning to activate nudging as a silent weapon, the risks directly connected to the concentration in few countries of online platforms directly connected with the last topic that is the emerging Internet of behaviour that thanks to the incredible amount of users’ data can monitor ad address citizens’ behaviours.
The list of impacts included will simply provide an idea about some of the potential threats, but they are not limited to this set.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">221</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alfredo M. Ronchi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">TAS: Trust Assessment System</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">big data</style></keyword><keyword><style  face="normal" font="default" size="100%">border security</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk Assessment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">44</style></volume><pages><style face="normal" font="default" size="100%">62-75</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The present article briefly introduces a general view on tomorrow’s border control system and EU inter-BCP real time information sharing, exploring and proposing new operational methods and solutions for border control procedures to increase the efficacy and efficiency of the whole security screening system at the same time reducing the efforts (costs/resources). The general description of the system logic and architecture introduces the core of the solution, the Trust Assessment System. A “black box” based on risk analysis and advanced machine learning algorithms aimed to assign a Traveller Trust Score to each single individual intending to cross the border. Main benefits are: improved checkpoint throughput, improved situational awareness and level of security, better traveller experience, optimisation of resources. The concept is that the traveller risk evaluation starts as soon as she/he applies for a visa, a passport or books a trip by whatever means of transport.</style></abstract><section><style face="normal" font="default" size="100%">62</style></section></record></records></xml>