Abstract
The ability to monitor and forecast citizen behavior on a large scale developed to be a top target for governments subject to security and intelligence that are collective in the current worldwide culture where the web has become the primary medium for commerce and communication. Meanwhile, significant privacy-related issues have surfaced considering the innovative opportunities that artificial intelligence (AI) generates for collective behavior analysis when presented to governments as a way in which the government will comprehend. In the current study, we conducted an extensive literature analysis using techniques such as data mining and interviews such as in-depth to determine the primary uses of Artificial Intelligence that governments use and describe citizens' privacy issues. Our findings showed that the government employed 11 AI initiatives to enhance interactions with residents, local organizations, services offered by government agencies, and the economy, among other things. Issues are identified relating to the risk of behavior modification, intelligent decision-making, data privacy regulation and law, digital surveillance, and decision automation as they pertain to people's privacy when governments deploy AI. Finally, the report concluded that the debate of developing rules centered on the moral citizen data architecture gathering, with consequences for governments aiming to regulate security, morality, and data privacy. We also suggest a study schedule with 16 research questions to be investigated in future studies.
Subject
Electrical and Electronic Engineering,Building and Construction
Reference17 articles.
1. Achar, S. (2015). Requirement of Cloud Analytics and Distributed Cloud Computing: An Initial Overview. International Journal of Reciprocal Symmetry and Physical Sciences, 2, 12–18. Retrieved from https://upright.pub/index.php/ijrsps/article/view/70
2. Achar, S. (2016). Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity. Engineering International, 4(2), 79-88. https://doi.org/10.18034/ei.v4i2.633
3. Achar, S. (2018). Security of Accounting Data in Cloud Computing: A Conceptual Review. Asian Accounting and Auditing Advancement, 9(1), 60–72. https://4ajournal.com/article/view/70
4. Barrionuevo, M., Lopresti, M., Miranda, N., & Piccoli, F. (2018). Secure computer network: Strategies and challengers in big data era. Journal of Computer Science and Technology, 18(3). https://doi.org/10.24215/16666038.18.e28
5. Chimakurthi, V. N. S. S. (2017). Cloud Security - A Semantic Approach in End to End Security Compliance. Engineering International, 5(2), 97-106. https://doi.org/10.18034/ei.v5i2.586
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献