Security intelligence in the age of AI : navigating legal and ethical frameworks
Artificial Intelligence (AI) has become a linchpin in modern security strategies, thanks to its ability to process vast amounts of data, identify patterns, and make data-driven predictions. However, this technological surge requires careful examination within legal and ethical frameworks. Security I...
Saved in:
| Other Authors | , , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Bingley, U.K. :
Emerald Publishing Limited,
2025.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781836081586 |
| DOI | 10.1108/9781836081562 |
| Physical Description | 1 online resource (336 pages) |
Cover
| LEADER | 00000nam a2200000Ii 4500 | ||
|---|---|---|---|
| 001 | em-9781836081586 | ||
| 003 | UtOrBLW | ||
| 005 | 20250711131536.0 | ||
| 006 | m o d | ||
| 007 | cr ||||||||||| | ||
| 008 | 250711t20252025enk ob 001 0 eng d | ||
| 020 | |a 9781836081586 |q (e-book) | ||
| 040 | |a UtOrBLW |b eng |e rda |c UtOrBLW | ||
| 080 | |a 341 | ||
| 082 | 0 | 4 | |a 005.8 |2 23 |
| 245 | 0 | 0 | |a Security intelligence in the age of AI : |b navigating legal and ethical frameworks / |c edited by Pushan Kumar Dutta, Bhupinder Singh, Christian Kaunert, Annita Larissa Sciacovelli. |
| 264 | 1 | |a Bingley, U.K. : |b Emerald Publishing Limited, |c 2025. | |
| 264 | 4 | |c ©2025 | |
| 300 | |a 1 online resource (336 pages) | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 500 | |a Includes index. | ||
| 504 | |a Includes bibliographical references. | ||
| 505 | 0 | |a Chapter 1. Can the red cross redefine the battlefield? Examining the icrc's influence on autonomous weapon systems in international humanitarian law / Akash Bag, Anwesha Ghosh, and Tejaswini Tripathy -- Chapter 2. A survey on legal judgement prediction using machine learning / P. Prasanna Kumari and G. V. Ramesh Babu -- Chapter 3. Customer churn prediction for retention analysis / Rajesh Saturi, Siripothula Rahul, Zuha Siddiqui, and Rachamalla Nikhitha -- Chapter 4. Elevating project manager responsibilities in construction projects through augmented and virtual reality integration: A review / Khush Attarde and Javed Sayyad -- Chapter 5. Role of emotional AI in enhancing performance evaluation and management / Gayathri Band, Kanchan Naidu, Soma Sharma, Yogesh Gharpure, and Geeta Naidu -- Chapter 6. Legal framework for the use of AI in security intelligence / Bhupinder Singh, Manmeet Kaur Arora, Sahil Lal, and Anjali Raghav -- Chapter 7. Strategizing algorithm: The prospects and perils of artificial intelligence (ai) in criminal justice reformation / Sofia Khatun and Sivananda Kumar K. -- Chapter 8. Recommendations for lawmakers towards building a trustworthy AI ecosystem / Anjali Raghav, Sahil Lal, Manmeet Kaur Arora, and Bhupinder Singh -- Chapter 9. Price of security, balancing security with civil liberties and risks in ai-driven surveillance / Manmeet Kaur Arora, Sahil Lal, Bhupinder Singh, and Anjali Raghav -- Chapter 10. Regulatory framework to data localisation: A comparative study of the European Union and the Indian context / Saurabh Chandra and Suparna Kundu -- Chapter 11. Assessing existing legal frameworks and their adaptability to AI advancements / Sahil Lal, Manmeet Kaur Arora, Anjali Raghav, and Bhupinder Singh -- Chapter 12. The role of AI in customer relationship management for tailored financial services / Lakshmi S. R., Rajimol KP, Y K Sunitha, Ajatashatru Samal, Priya R P, and Srija HR -- Chapter 13. Achieving organizational achievement via the use of AI in machine management / Shiney Chib, Falguni Pawar, Shantanu S Bose, Thirulogasundaram V. P., Prasanna H N, and Lakshmi S. R. -- Chapter 14. Is artificial intelligence the new vanguard? Exploring the transformation in India's defence strategies / Tamasi Biswas, Bhaskarjit Roy, Debadrita Basu, and Shayani Chakraborty -- Chapter 15. Role of artificial intelligence in gamification in the era of security intelligence: A bibliometric analysis / Archana Singh, Girish Lakhera, Megha Ojha, and Amar Kumar Mishra -- Chapter 16. The enhancing security in project management through artificial intelligence: A bibliometrics study / Megha Ojha, Vinay Kandpal, Amar Kumar Mishra, and Archana Singh -- Chapter 17. Credit card fraud detection using machine learning / U. Sivaji, Akkati Sreeja, Kodathala Srihitha, and Gudepu Vinay -- Chapter 18. Copyright and artificial intelligence: Authorship v. Ownership conundrum / Vaishnavi Yashasvi and Ruchir Singh -- Chapter 19. Enhancing customer experience through ai-driven digital banking: A case study of icici bank in vidarbha / Devendra Kakwani, Kanchan Naidu, and Gayathri Band. | |
| 520 | |a Artificial Intelligence (AI) has become a linchpin in modern security strategies, thanks to its ability to process vast amounts of data, identify patterns, and make data-driven predictions. However, this technological surge requires careful examination within legal and ethical frameworks. Security Intelligence in the Age of AI: Navigating Legal and Ethical Frameworks explores the potential of AI technologies in security intelligence and examines the legal framework surrounding their use. Authors in this collected edition address how existing legal frameworks adapt to the intricacies of AI in security intelligence. They advocate for the development of adaptive and forward-looking legal structures and propose recommendations for policymakers to craft legislation that keeps pace with the evolving landscape of AI in the realm of security. This approach is crucial to ensure that technological advancements do not outpace our ability to regulate them effectively. This work serves as a valuable guide for researchers and practitioners interested in leveraging AI technologies to enhance security intelligence. Legal professionals, security practitioners, and policy makers gain insight from contributions from leading scholars in the field of security intelligence and AI applications. | ||
| 588 | 0 | |a Print version record. | |
| 650 | 0 | |a Computer security. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Dutta, Pushan Kumar, |e editor. | |
| 700 | 1 | |a Singh, Bhupinder, |e editor. | |
| 700 | 1 | |a Kaunert, Christian, |e editor. | |
| 700 | 1 | |a Sciacovelli, Annita Larissa, |e editor. | |
| 776 | 0 | 8 | |i Print version: |z 9781836081579 |
| 776 | 0 | 8 | |i PDF version: |z 9781836081562 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://doi.org/10.1108/9781836081562 |