[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Security of Cyber-Physical-Social Systems: Impact of Simulation-Based Systems Engineering, Artificial Intelligence, Human Involvement, and Ethics

  • Chapter
  • First Online:
Advances in Computing, Informatics, Networking and Cybersecurity

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 289))

  • 809 Accesses

Abstract

Almost every aspect of life is becoming connected. The types of the connectedness of the cyber-physical-social systems are outlined. They span from Internet of Things to Internet of senses (including Internet of eyes and ears) and Internet of brains. Some sources of failures in Cyber-Physical-Social systems as well as the fact that with increased connectedness, the systems become more vulnerable are outlined. Some possibilities to get prepared for unexpected conditions are discussed. They include experience and experimentation aspects of simulation, systems engineering, simulation-based systems engineering, as well as artificial intelligence. The possible dangers of AI are pointed out. Often solutions to technical problems are sought in technical realms. In the article, impact of human involvement is elaborated as sources of additional and severe problems.

Efficiency is doing things right; effectiveness is doing the right thing.

Peter Drucker (1909–2005)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 87.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 109.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Angelini, L., et al.: Internet of tangible things (IoTT): challenges and opportunities for tangible interaction with IoT. Informatics 5(7), 1–34 (2018)

    Google Scholar 

  2. APA DoP−Machiavellianism: American Psychological Association, Dictionary of Psychology−Machiavellianism. https://dictionary.apa.org/machiavellianism. Accessed 11 Dec 2020

  3. Ayala, L.: Cybersecurity Lexicon. Apress, Springer Science, New York, NY (2016)

    Book  Google Scholar 

  4. Barrat, J.: Artificial Intelligence and the End of the Human Era—Our Final Invention. Thomas Dunne Books, St. Martin’s Press, New York, NY (2013)

    Google Scholar 

  5. Bostrom, N.: Superintelligence—Paths, Dangers, Strategies. Oxford University Press, Oxford, UK (2014)

    Google Scholar 

  6. Bostrom, N., Yudkowsky, E.: The ethics of artificial intelligence. In: Frankish, K., Ramsey, W. (eds.) Chapter 15 of Cambridge Handbook of Artificial Intelligence, pp. 316–334. Cambridge University Press, New York. https://intelligence.org/files/EthicsofAI.pdf. Accessed 19 Dec 2020

  7. Bristow, W.: Enlightenment, Stanford Encyclopedia of Philosophy (2017). https://plato.stanford.edu/entries/enlightenment/. Accessed 15 Dec 2020

  8. Center for Ethical Leadership: What Most Leaders Miss About the Value of Virtue—New research suggests that to achieve the highest levels of performance, leaders need both character and competence. University of Notre Dame. https://ethicalleadership.nd.edu/news/what-most-leaders-miss-about-the-value-of-virtue/. Accessed 19 Dec 2020

  9. Copeland, B.J.: Artificial Intelligence, Britannica (2020). https://www.britannica.com/technology/artificial-intelligence/The-Turing-test. Accessed 28 Dec 2020

  10. CWU: What’s next for smart homes: An ‘Internet of Ears?’ Case western University (2018). https://techxplore.com/news/2018-11-smart-homes-internet-ears.html?utm_source=TrendMD&utm_medium=cpc&utm_campaign=TechXplore.com_TrendMD_1. Accessed 24 Dec 2020

  11. Cybersecurity Guide: A planning guide for a master’s degree in cybersecurity (2020). https://cybersecurityguide.org/programs/masters-in-cybersecurity/. Accessed 10 Dec 2020

  12. CyBOK: The Cyber Security Body of Knowledge (2019). https://www.cybok.org/. Accessed 10 Dec 2020

  13. Diallo, S., Tolk, A., Gore, R., Padilla, J.: Modeling and simulation framework for systems engineering. In: Gianni., D., D’Ambrogio, A., Tolk, A. (eds.) Modeling and Simulation-Based Systems Engineering Handbook, pp. 377–400. CRC Press, Taylor and Francis Group, Boca Raton, FL (2015)

    Google Scholar 

  14. Dignum, V.: Ethics in artificial intelligence: introduction to the special issue. Ethics Inf. Technol. 20, 1–3 (2018). https://link.springer.com/article/10.1007%2Fs10676-018-9450-z. Accessed 19 Dec 2020

  15. Durant, W., Durant, A.: The Story of Civilization VII—The Age of Reason Begins (A History of European Civilization in the Period of Shakespeare, Bacon, Montaign, Rembrant, Galileo and Descartes: 1558–1648). Simon and Schuster, New York, NY (1961)

    Google Scholar 

  16. Ericsson CL: Ericsson ConsumerLab: Ten Hot Consumer Trends 2030—The Internet of Senses. 10 Hot Consumer Trends 2030 (2020). https://www.ericsson.com/4ae16a/assets/local/reports-papers/consumerlab/infographs/10hct_2030_infographic.pdf. Accessed on 9 Dec 2020

  17. Evenstad, L.: Ethics Key to AI Development, says Lords Committee—House of Lords Select Committee calls for government to draw up an ethical code of conduct, which organisations developing AI can sign up to. ComputerWeekly.com (2018). https://www.computerweekly.com/news/252438994/Ethics-key-to-AI-development-says-Lords-committee. Accessed 19 Dec 2020

  18. Fagan, B.M. (ed.): The Seventy Great Inventions of the Ancient World. Thames & Hudson, London, England (2004)

    Google Scholar 

  19. FHI—Future of Humanity Institute, University of Oxford. https://www.fhi.ox.ac.uk/. Accessed 22 Dec 2020

  20. FHI Research Areas. https://www.fhi.ox.ac.uk/research/research-areas/. Accessed 22 Dec 2020

  21. Fourtané, S.: Top Strategic Technology Trends for 2021, Interesting Engineering, 19 Nov 2020

    Google Scholar 

  22. Fourtané, S.: Emerging Consumer Trends Evolving Toward 2030: The Internet of Senses, Interesting Engineering, 9 Dec 2020

    Google Scholar 

  23. GC: Understanding Human Side of Cybersecurity, 8–9 Oct 2020, Virtual Conference, Government of Canada (2020). https://www.csps-efpc.gc.ca/events/human-cybersecurity/index-eng.aspx. Accessed 19 Dec 2020

  24. GCRI—Global Catastrophic Risk Institute. http://gcrinstitute.org/. Accessed 19 Dec 2020

  25. Gianni, D., D’Ambrogio, A., Tolk, A.: Modeling and Simulation-Based Systems Engineering Handbook. CRC Press, Taylor and Francis Group, Boca Raton, Florida (2015)

    Google Scholar 

  26. Global Knowledge—Cybersecurity Glossary of Terms. https://www.globalknowledge.com/us-en/topics/cybersecurity/glossary-of-terms/. Accessed 10 Dec 2020

  27. Goodman, S.E., Lin, H.S.: Toward a Safer and More Secure Cyberspace. NAP (The National Academies Press), Washington, DC (2007). https://www.nap.edu/catalog/11925/toward-a-safer-and-more-secure-cyberspace. Accessed 19 Dec 2020

  28. Haque, Md.A., Gochhayat, S.P., Shetty, S., Krishnappa, B.: Cloud-based simulation platform for quantifying cyber-physical systems resilience. In: Risco-Martin, J.-L., S. Mittal, T. Ören (eds.) Simulation for Cyber-Physical Systems Engineering: A Cloud-based Context, pp. 349–384. Springer (2020)

    Google Scholar 

  29. Harari, Y.N.:. Sapiens—A Brief History of Humankind. Signal—Penguin Random House Canada, Toronto, Ontario, Canada (2014)

    Google Scholar 

  30. Hofstede, G.: Culture’s Consequences: Comparing Values, Behaviors. Sage Publications, Thousand Oaks, CA, Institutions and Organizations Across Nations (2001)

    Google Scholar 

  31. Hofstede-website: https://geerthofstede.com/landing-page/. Accessed 12 Dec 2020

  32. HumanHow: The Ultimate List of Cognitive Biases: Why Humans Make Irrational Decisions (2020). http://humanhow.com/list-of-cognitive-biases-with-examples/. Accessed 12 Dec 2020

  33. Irani, R., Monfard, P.S., Kazemifard, M., Ören, T.: Computationally aware systems: recommended features through a review of 188 definitions and its relevance to advanced simulation. Int. J. Model. Simul. Sci. Comput. (2021—In Press—Invited contribution)

    Google Scholar 

  34. JAGI – The Journal of AGI Society. https://content.sciendo.com/view/journals/jagi/jagi-overview.xml (Accessed 2020–12–31).

  35. Kavanagh, J., Rich, M.D.: Truth Decay—An Initial Exploration of the Diminishing Role of Facts and Analysis in American Public Life. RAND Corporation, Santa Monica, CA (2018). https://www.rand.org/pubs/research_reports/RR2314.html. Accessed 14 Dec 2020

  36. Keystone-Master: 94 MSc Programs in Cybersecurity. https://www.masterstudies.com/MSc/Cyber-Security/. Accessed 10 Dec 2020

  37. Lazarova-Molnar, S., Mohamed, N.: Reliability analysis of cyber-physical systems. In: Risco-Martin, J.-L., S. Mittal, T. Ören (eds.) Simulation for Cyber-Physical Systems Engineering: A Cloud-based Context, pp. 385–405. Springer (2020)

    Google Scholar 

  38. Loper, M.L.: Dimensions of trust in cyber physical systems. In: Risco-Martin, J.-L., S. Mittal, T. Ören (eds.) Simulation for Cyber-Physical Systems Engineering: A Cloud-based Context, pp. 407–427. Springer (2020)

    Google Scholar 

  39. Langley, D.J., et al.: The internet of everything: smart things and their impact on business models. J. Bus. Res. 122(January 2021), 853–863 (2021). https://www.sciencedirect.com/science/article/pii/S014829631930801X (Accessed 2020–12–31).

  40. Maasberg, M., Van Slyke, C., Ellis, S., Beebe, N.: The dark triad and insider threats in cyber security. Commun. ACM 63(12), 64–70 (2020). https://cacm.acm.org/magazines/2020/12/248799-the-dark-triad-and-insider-threats-in-cyber-security/fulltext. Accessed 31 Dec 2020

  41. Maasberg, M., Warrn, J., Beebe, N.:. The dark side of the insider: detecting the insider threat through examination of dark triad personality traits. In: 2015 48th Hawaii International Conference on System Sciences, pp. 3518–3526 (2015). https://www.computer.org/csdl/proceedings-article/hicss/2015/7367d518/12OmNz2TCGs. Accessed 1 Jan 2021

  42. McFadden, C.: Microsoft confirms hackers accessed its source code. Interesting Engineering, 1 Jan 2021. https://interestingengineering.com/microsoft-confirms-hackers-accessed-its-source-code?_source=newsletter&_campaign=Bz1yoKMzEY54v&_uid=4oeERrJWa0&_h=919ba87c882eb99a495edecc59557c1837f70ce6&utm_source=newsletter&utm_medium=mailing&utm_campaign=Newsletter-01-01-2021. Accessed 1 Jan 2020

  43. MEDES’21The 13th International ACM Conference on Management of Digital EcoSystems, 1–3 Nov 2021, Hammamet, Tunisia. http://medes.sigappfr.org/21/call-for-papers. Accessed 11 Dec 2020

  44. Merriam-Webster: https://www.merriam-webster.com/dictionary/. Accessed 13 Dec 2020

  45. Miller, M.: Senate passes bill to secure internet-connected devices against cyber vulnerabilities. The Hill (2020). https://thehill.com/policy/cybersecurity/526605-senate-passes-bill-to-secure-internet-connected-devices-against-cyber. Accessed 19 Dec 2020

  46. Miller, M.J.: Gartner’s Top Strategic Technology Trends for 2021 (2020). https://www.pcmag.com/news/gartners-top-strategic-technology-trends-for-2021

  47. Mittal, S., Durak, U., Ören, T. (eds.): Guide to Simulation-Based Disciplines: Advancing our Computational Future. Springer (2017)

    Google Scholar 

  48. Morgan, S., Morgan, C.: The motherlist glossary of cybersecurity and cybercrime definitions. Cybercrime Magazine (2020). https://cybersecurityventures.com/cybersecurity-glossary/. Accessed 10 Dec 2020

  49. NAP: National Academies of Sciences, Engineering, and Medicine. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. The National Academies Press, Washington, DC (2019). https://www.nap.edu/download/25488. Accessed 28 Dec 2020

  50. NASEM: Information Technology Innovation: Resurgence, Confluence, and Continuing Impact. NAP (The national Academies press), Washington, DC (2020)

    Google Scholar 

  51. NICCS (National Initiative for Cybersecurity Careers and Studies): Cybersecurity Glossary (2020). https://niccs.cisa.gov/about-niccs/cybersecurity-glossary. Accessed 10 Dec 2020

  52. Nisselson, E.: It’s coming! The Internet of Eyes will allow objects to see. TNW (2016). https://thenextweb.com/insider/2016/05/13/the-internet-of-eyes-and-the-personification-of-everything-around-you/. Accessed 24 Dec 2020

  53. NIST-CSD (Information Technology Laboratory—Computer Security Resource Center): Glossary. https://csrc.nist.gov/glossary. Accessed 10 Dec 2020

  54. OED-myth-information: https://www.lexico.com/definition/myth-information. Accessed 13 Dec 2020

  55. OED-reliability: https://www.lexico.com/definition/reliability. Accessed 27 Nov 2020

  56. Olson, S.: The Endless Frontier—The Next 75 Years in Science. The National Academies Press, Washington, DC (2020) (Rapporteur). https://www.nap.edu/catalog/25990/the-endless-frontier-the-next-75-years-in-science. Accessed 22 Dec 2020

  57. Ören, T.: Concepts and criteria to assess acceptability of simulation studies: a frame of reference. CACM 24(4), 180–189 (1981)

    Article  Google Scholar 

  58. Ören, T.I.: Rationale for a code of professional ethics for simulationists. In: Proceedings of the 2002 Summer Computer Simulation Conference, pp. 428–433 (2002)

    Google Scholar 

  59. Ören, T.I.: Ethics as a basis for sustainable civilized behavior for humans and software agents. Acta Systemica 2(1), 1–5. Also published in the Proceedings of the InterSymp 2002—The 14th International Conference on Systems Research, Informatics and Cybernetics of the IIAS, July 29–August 3, Baden-Baden, Germany (2002—Invited Plenary Paper). https://www.researchgate.net/publication/249853648_Ethics_as_a_Basis_for_Sustainable_Civilized_Behavior_for_Humans_and_Software_Agents. Accessed 19 Dec 2020

  60. Ören, T.: Simulation of cyber-physical systems of systems: some research areas—computational understanding, awareness and wisdom. J. Chin. Simul. Syst., issue 2 (2018)

    Google Scholar 

  61. Ören, T.: Powerful higher-order synergies of cybernetics, systems thinking, and agent-directed simulation for cyber-physical systems. Acta Syst. 18(2) (July 2018), 1–5 (2018)

    Google Scholar 

  62. Ören, T.: Grand challenges in modeling and simulation: what M&S can do and what we should do for M&S? In: Keynote at CCCI 2020—IEEE International Conference on Communications, Computing, Cybersecurity, and Informatics, Virtual Conference, 3–5 Nov 2020. www.site.uottawa.ca/~oren/pres/2020-CCCI.ppsx. Accessed 19 Dec 2020

  63. Ören, T.: Statement at the panel recent trends and challenges in communications, computing, cybersecurity and informatics. In: CCCI 2020—IEEE International Conference on Communications, Computing, Cybersecurity, and Informatics, Virtual Conference, 3–5 Nov 2020. www.site.uottawa.ca/~oren/pres/CCCI-panel.ppsx . Accessed 19 Dec 2020

  64. Ören, T.: Ethical and other highly desirable requirements for cyber-physical systems engineering. In: Risco-Martin, J.-L., S. Mittal, T. Ören (eds.) Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context, pp. 429–445. Springer (2020)

    Google Scholar 

  65. Ören, T.: Agent-directed simulation and nature-inspired modeling for cyber-physical systems engineering. In: Risco-Martin, J.-L., S. Mittal, T. Ören (eds.) Simulation for Cyber-Physical Systems Engineering: A Cloud-based Context, pp. 143–166. Springer (2020)

    Google Scholar 

  66. Ören, T.: Shift of Paradigm from Model-based to Simulation-based. In: Obaidat, M.S., T. Ören, H. Szczerbicka, (eds.) Simulation and Modeling Methodologies, Technologies and Applications—9th International Conference, SIMULTECH 2019, Prague, Czech Republic, July 29–31, 2019, Revised Selected Papers. Springer (In the Series: Advances in Intelligent Systems and Computing), pp. 29–45 (2020—Invited Chapter)

    Google Scholar 

  67. Ören, T., Ghasem-Aghaee, N., Yilmaz, L.: An ontology-based dictionary of understanding as a basis for software agents with understanding abilities. In: Proceedings of the Spring Simulation Multiconference (SpringSim’07), March 25–29, pp. 19–27, Norfolk, VA (2007)

    Google Scholar 

  68. Ören, T., Kazemifard, M., Noori, F.: (2015-Feature article). Agents with four categories of understanding abilities and their role in two-stage (deep) emotional intelligence simulation. Int. J. Model. Simul. Sci. Comput. (IJMSSC) 6(3) (September), 1–16 (2015)

    Google Scholar 

  69. Ören, T., Mittal, S., Durak, U.: A shift from model-based to simulation-based paradigm: timeliness and usefulness for many disciplines. Int. J. Comput. Softw. Eng. 3(1) (2018—Invited Paper)

    Google Scholar 

  70. Ören, T., Yilmaz, L.: Failure avoidance in agent-directed simulation: beyond conventional V&V and QA. In: Yilmaz, L., Ören, T. (eds.) Agent-Directed Simulation and Systems Engineering. Systems Engineering Series, pp. 189–217. Wiley-Berlin, Germany (2009)

    Google Scholar 

  71. Ören, T., Yilmaz, L.: Synergies of simulation, agents, and systems engineering. Expert Syst. Appl. 39(1), 81–88 (2012)

    Google Scholar 

  72. Ören, T., Yilmaz, L.: The Age of the Connected World of Intelligent Computational Entities: Reliability Issues including Ethics. Autonomy and Cooperation of Agents (Invited ebook chapter) Faria Nassiri Mofakham. Frontiers in Artificial Intelligence—Intelligent Computational Systems, Bentham Science Publishers 2017, 184–213 (2017)

    Google Scholar 

  73. Oxford Dictionary—Word of the year 2016: Post-truth. https://languages.oup.com/word-of-the-year/2016/. Accessed 14 Dec 2020

  74. Principia_Cybernetica_Web: Cybernetics. Web Dictionary of Cybernetics and Systems. http://pespmc1.vub.ac.be/ASC/CYBERNETICS.html. Accessed 21 Dec 2020

  75. Quinn, A.: Virtue Ethics and Professional Journalism. Springer, Cham, Switzerland (2018)

    Book  Google Scholar 

  76. Radley, A.: Cybersecurity: Lexicon (2020). https://scienceofcybersecurity.com/lexicon/. Accessed 10 Dec 2020

  77. RAND: Countering Truth Decay—A RAND Initiative to Restore the Role of Facts and Analysis in Public Life. https://www.rand.org/research/projects/truth-decay.html. Accessed 13 Dec 2020

  78. Risco-Martin, J.-L., Mittal, S., Ören, T. (eds.): Simulation for Cyber-Physical Systems Engineering: A Cloud-based Context. Springer (2020). https://www.springer.com/gp/book/9783030519087. Accessed 27 Dec 2020

  79. Roberts, M.: Welcome to the Age of Digital Interdependence. United Nations Foundation (2019). https://unfoundation.org/blog/post/welcome-to-the-age-of-digital-interdependence/. Accessed 24 Dec 2020

  80. SEBoK: The Guide to the Systems Engineering Body of Knowledge, INCOSE-International Council on Systems Engineering (2013). https://www.sebokwiki.org/wiki/Systems_Engineering_(glossary). Accessed 27 Dec 2020

  81. SEP-Machiavelli: Stanford Encyclopedia of Philosophy—Machiavelli. https://plato.stanford.edu/entries/machiavelli/1. Accessed1 Dec 2020

  82. Sharre, P.: Army of None: Autonomous Weapons and the Future of War. W.W. Norton & Company, New York | London (2018)

    Google Scholar 

  83. Shulman, C.: Omohundro’s “Basic AI Drives” and Catastrophic Risks. The Singularity Institute, San Francisco, CA (2010). https://intelligence.org/files/BasicAIDrives.pdf. Accessed 30 Dec 2020

  84. Smithsonian: Timelines of Science—The Ultimate Visual Guide to the Discoveries that Shaped the World. DK Publishing, New York, NY (2013)

    Google Scholar 

  85. Smithsonian: Science—The Definitive Visual Guide. Revised and, 2nd edn. DK Publishing, New York, NY (2016)

    Google Scholar 

  86. Stanovich, K.F. (2015). Rational and Irrational Thought: The Thinking That IQ Tests Miss—Why smart people sometimes do dumb things. Scientific American Mind, 1 Jan 2015. https://www.scientificamerican.com/article/rational-and-irrational-thought-the-thinking-that-iq-tests-miss/. Accessed 12 Dec 2020

  87. Sterritt, R.:. Apoptotic computing: programmed death by default for computer-based systems. IEEE Computer, January 2011, pp. 37–43 (2011). https://pure.ulster.ac.uk/ws/portalfiles/portal/11822513/r1ster4.pdf. Accessed 26 Dec 2020

  88. Sterritt, R., Hinchey, M.G.: Why computer-based systems should be autonomic. In: Unknown Host Publication, pp. 406–412. IEEE Computer Society (2005)

    Google Scholar 

  89. TIME: 100 New Scientific Discoveries—Fascinating, Momentous and Mind-Expanding Breakthroughs). Special TIME edition (2017). https://www.amazon.ca/TIME-Scientific-Discoveries-Mind-Expanding-Breakthroughs/dp/1683307356. Accessed 22 Dec 2020

  90. Tolk, A., Glazner, C.G., Pitsko, R.: Simulation-based systems engineering. In: S. Mittal, U. Durak, T. Ören (Eds.), Guide to Simulation-Based Disciplines. Simulation Foundations, Methods and Applications, pp. 75–102. Springer, Cham, Switzerland (2017)

    Google Scholar 

  91. Travers, M.: How to Recognize Dark Triad Traits. Psychology Today, 9 Aug 2020 (2020). https://www.psychologytoday.com/ca/blog/social-instincts/202008/how-recognize-dark-triad-traits. Accessed 11 Dec 2020

  92. UN-HLP DC.: The Age of Digital Interdependence. Report of the UN Secretary-General’s High-level Panel on Digital Cooperation (2019). https://www.un.org/en/pdfs/DigitalCooperation-report-for%20web.pdf. Accessed 24 Dec 2020

  93. UNESCO: Journalism, ‘Fake News’ & Disinformation: Handbook for Journalism Education and Training (2018). https://unesdoc.unesco.org/ark:/48223/pf0000265552. Accessed 14 Dec 2020

  94. Veldkamp, C.L.S.: The human fallibility of scientists: dealing with error and bias in academic research. Ph.D. Thesis, Tilburg University, Tilburg, The Netherlands (2017)

    Google Scholar 

  95. Voas, J., Kuhn, R., Laplante, P., Applebaum, S.: Internet of things (IoT) trust concerns. NIST cybersecurity white paper, 17th October (2018). https://csrc.nist.gov/CSRC/media/Publications/white-paper/2018/10/17/iot-trust-concerns/draft/documents/iot-trust-concerns-draft.pdf. Accessed 22 Dec 2020

  96. Wallden, P., Kashefi, E.: Cyber security in the quantum era. CACM 62(4), 120 (2019). https://cacm.acm.org/magazines/2019/4/235578-cyber-security-in-the-quantum-era/fulltext. Accessed 24 Dec 2020

  97. WEF: World Economic Forum—Why we urgently need a Digital Geneva Convention (2017). https://www.weforum.org/agenda/2017/12/why-we-urgently-need-a-digital-geneva-convention. Accessed 24 Dec 2020

  98. Wiener, N.: Cybernetics or Control and Communication in the Animal and the Machine, 2nd edn. The MIT Press, Cambridge, MA, USA (March 15 1965) (1948)

    Google Scholar 

  99. Wikipedia-AF: Alternative facts (2020). https://en.wikipedia.org/wiki/Alternative_facts. Accessed 19 Dec 2020

  100. Wikipedia-FHI: Future of Humanity Institute (2020). https://en.wikipedia.org/wiki/Future_of_Humanity_Institute. Accessed 23 Dec 2020

  101. Wikipedia-HCDT: Hofstede’s cultural dimensions theory (2020). https://en.wikipedia.org/wiki/Hofstede%27s_cultural_dimensions_theory. Accessed 12 Dec 2020

  102. Wikipedia-ME: Machine Ethics (2020). https://en.wikipedia.org/wiki/Machine_ethics. Accessed 19 Dec 2020

  103. Williams, T.I.: (Updated and Revised by William E. Schaaf, J. and Arianne E. Burnette) (1999). A History of Invention from Stone Axes to Silicon Chips. Little, Brown Company, UK (1987)

    Google Scholar 

  104. Yilmaz, L., Ören, T.I. (eds.): (All Chapters by Invited Contributors). Agent-Directed Simulation and Systems Engineering. Wiley Series in Systems Engineering and Management, Wiley-Berlin, Germany, 520 p (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tuncer Ören .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ören, T. (2022). Security of Cyber-Physical-Social Systems: Impact of Simulation-Based Systems Engineering, Artificial Intelligence, Human Involvement, and Ethics. In: Nicopolitidis, P., Misra, S., Yang, L.T., Zeigler, B., Ning, Z. (eds) Advances in Computing, Informatics, Networking and Cybersecurity. Lecture Notes in Networks and Systems, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-030-87049-2_26

Download citation

Publish with us

Policies and ethics