Search

Ethics in Artificial Intelligence : an Approach to Cybersecurity

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20240013240</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20240829101726.0</controlfield>
    <controlfield tag="008">240829e20240619esp|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Ethics in Artificial Intelligence</subfield>
      <subfield code="b">: an Approach to Cybersecurity</subfield>
      <subfield code="c">Ariel López González [et al.]</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">In the paper, an analysis is conducted on the intricate relationship between ethics, artificial intelligence, and cybersecurity. The ethical principles that govern the advancement of AI are examined, alongside the security issues that arise from its implementation. The ethical utilization of artificial intelligence in the realms of cybersecurity and hacking is explored. Emphasis is placed on the significance of AI ethics, particularly in terms of transparency, accountability, and fairness. Additionally, the paper delves into the security challenges that emerge as AI is adopted, such as safeguarding user privacy and ensuring equitable access to the technology</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080611200</subfield>
      <subfield code="a">Inteligencia artificial</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080538668</subfield>
      <subfield code="a">Ética</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080544119</subfield>
      <subfield code="a">Hackers</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20240020811</subfield>
      <subfield code="a">López González, Ariel </subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20200034445</subfield>
      <subfield code="g">19/06/2024 Volumen 27 Número 73 - junio 2024 , p. 38-54</subfield>
      <subfield code="x">1988-3064</subfield>
      <subfield code="t">Revista Iberoamericana de Inteligencia Artificial</subfield>
      <subfield code="d"> : IBERAMIA, Sociedad Iberoamericana de Inteligencia Artificial , 2018-</subfield>
    </datafield>
    <datafield tag="856" ind1=" " ind2=" ">
      <subfield code="u">https://journal.iberamia.org/index.php/intartif/article/view/1267</subfield>
    </datafield>
  </record>
</collection>