Roba Abbas
YOU?
Author Swipe
View article: Strengthening security, privacy, and trust in artificial intelligence software for critical infrastructure in the United States
Strengthening security, privacy, and trust in artificial intelligence software for critical infrastructure in the United States Open
As artificial intelligence (AI) systems become increasingly embedded in critical infrastructure such as energy, transportation, and healthcare, ensuring their security, privacy, and trustworthiness is essential. This study investigates the…
View article: Secure by design - enhancing software products with AI-Driven security measures
Secure by design - enhancing software products with AI-Driven security measures Open
As cyber threats continue to evolve in scale and complexity, traditional reactive security measures no longer suffice. This study explores the integration of AI-driven security within the Secure by Design framework as a forward-looking app…
View article: The Role of Target Costing and Quality Function in Improving Product Value
The Role of Target Costing and Quality Function in Improving Product Value Open
In light of the economic and competitive transformations currently taking place in the world, companies are constantly striving to improve the value of their products and increase profitability. Among the practical tools for achieving this…
View article: Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard Open
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security mea…
View article: Leveraging Machine Learning to Strengthen Network Security and Improve Threat Detection in Blockchain for Healthcare systems
Leveraging Machine Learning to Strengthen Network Security and Improve Threat Detection in Blockchain for Healthcare systems Open
This study investigates the integration of blockchain technology and machine learning to enhance network security and improve threat detection in healthcare systems. With healthcare systems increasingly vulnerable to cyberattacks, the stud…
View article: Harnessing Big Data Analytics for Advanced Detection of Deepfakes and Cybersecurity Threats Across Industries
Harnessing Big Data Analytics for Advanced Detection of Deepfakes and Cybersecurity Threats Across Industries Open
The rise of deepfake technology has introduced a new layer of complexity to cybersecurity, creating opportunities for misuse in areas like misinformation, fraud, and identity theft. These challenges are further amplified by the speed at wh…
View article: The Role of Artificial Intelligence in Strengthening Privacy and Security in the Era of Cyber Crime and Digital Forensics
The Role of Artificial Intelligence in Strengthening Privacy and Security in the Era of Cyber Crime and Digital Forensics Open
This study explores the role of Artificial Intelligence (AI) in strengthening privacy and security amidst the growing challenges of cybercrime and digital forensics. As cyber-attacks become more sophisticated, traditional methods of securi…
View article: Providing Nutrition Information on US Restaurant Menus: A Systematic Review Since the Affordable Care Act (2010)
Providing Nutrition Information on US Restaurant Menus: A Systematic Review Since the Affordable Care Act (2010) Open
One noteworthy provision in the Affordable Care Act (ACA) of 2010 in the USA was the mandate for restaurants with more than 20 locations to provide nutrition information on their printed restaurant menus and menu boards. This provision has…
View article: Robodebt: A Socio-Technical Case Study of Public Sector Information Systems Failure
Robodebt: A Socio-Technical Case Study of Public Sector Information Systems Failure Open
Large-scale public sector information systems (PSIS) that administer social welfare payments face considerable challenges. Between 2014 and 2023, an Australian government agency conceived and implemented the Online Compliance Intervention …
View article: Public Interest Technology for Innovation in Global Development: Recommendations for Launching PIT Projects
Public Interest Technology for Innovation in Global Development: Recommendations for Launching PIT Projects Open
This paper serves as an Introduction to the Public Interest Technology (PIT) for Innovation in Global Development Special Issue, based on a workshop of the same title held in September 2023. The paper's contribution is in proposing recomme…
View article: The Current State and Future Trajectory of the Sharing Economy: A Multi-Stakeholder Perspective
The Current State and Future Trajectory of the Sharing Economy: A Multi-Stakeholder Perspective Open
The COVID-19 pandemic has had a transformative impact on social and economic value, as well as the role of mediating technology and regulation driving participation in the sharing economy. Considering the consequences that such transformat…
View article: Call for Senior Editors and Associate Editors of the IEEE Transactions on Technology and Society
Call for Senior Editors and Associate Editors of the IEEE Transactions on Technology and Society Open
The IEEE Transactions on Technology and Society (TTS or Transactions) is a publication of the IEEE Society on the Social Implications of technology (IEEE SSIT) established in 2020 [1] , [2] . The IEEE TTS is technically co-sponsored by the…
View article: Publishing for Impact: Interdisciplinary Reflections
Publishing for Impact: Interdisciplinary Reflections Open
The term research impact is variously defined in academic scholarship, by national and international research funding bodies, publishers, and other relevant entities, although common definitional elements exist. Concise definitions describ…
View article: Securitization for Sustainability of People and Place
Securitization for Sustainability of People and Place Open
Security and securitization can be defined in numerous ways. For example, an all-hazards approach to (national) security has been considered in the literature whereby we may refer to economic, environmental, and energy security [1], in add…
View article: AI in Cybersecurity: The Paradox
AI in Cybersecurity: The Paradox Open
Modern artificial intelligence is inherently paradoxical in many ways. While AI aims to increase automation, it also requires more intimate human involvement to reflect on the insights generated (automation paradox). While AI results in jo…
View article: Socio-Technical Ecosystem Considerations: An Emergent Research Agenda for AI in Cybersecurity
Socio-Technical Ecosystem Considerations: An Emergent Research Agenda for AI in Cybersecurity Open
Cybersecurity continues to be a key element of national security. Given that critical infrastructure is powered by digital systems, any disruption to the flow of vital services has the potential effect of causing harm to citizens, organiza…
View article: Designing AI Using a Human-Centered Approach: Explainability and Accuracy Toward Trustworthiness
Designing AI Using a Human-Centered Approach: Explainability and Accuracy Toward Trustworthiness Open
One of the major criticisms of Artificial Intelligence is its lack of explainability. A claim is made by many critics that without knowing how an AI may derive a result or come to a given conclusion, it is impossible to trust in its outcom…
View article: What Happens to COVID-19 Data After the Pandemic? Socio-Technical Lessons
What Happens to COVID-19 Data After the Pandemic? Socio-Technical Lessons Open
The COVID-19 global pandemic outbreak meant a complete reevaluation of societal interactions, business processes, and government policies. For decades, the scientific and technical communities had contemplated the possibility of an all-out…
View article: Co-Designing Location-Based Services for Individuals Living With Dementia: An Overview of Present and Future Modes of Operation
Co-Designing Location-Based Services for Individuals Living With Dementia: An Overview of Present and Future Modes of Operation Open
Dementia is an encompassing term used to define a series of 'neurological conditions, of which the major symptom includes a global decline in brain function' [17]. Alzheimer's Disease International [6] reports that every three seconds, one…
View article: Machine Learning, Convergence Digitalization, and the Concentration of Power: Enslavement by Design Using Techno-Biological Behaviors
Machine Learning, Convergence Digitalization, and the Concentration of Power: Enslavement by Design Using Techno-Biological Behaviors Open
The dawn of electronic business (e-business) changed the way that individuals interact not only with one another but also with the companies that supply them with goods and services, as well as with the government agencies on which they de…
View article: Biometrics and AI Bias
Biometrics and AI Bias Open
While humans share many physical characteristics, they are not replicas of one another in appearance. Despite their uniqueness, common features mean that comparisons can be made. The ability to identify someone by face has been one of the …
View article: Co-Designing the Future With Public Interest Technology
Co-Designing the Future With Public Interest Technology Open
This special issue is dedicated to the theme of public interest technology (PIT) [1]. PIT acknowledges that technological potential can be harnessed to satisfy the needs of civil society. In other words, technology can be seen as a public …
View article: Public Interest Technology, Citizen Assemblies, and Performative Governance
Public Interest Technology, Citizen Assemblies, and Performative Governance Open
Social activity can be directed toward attempts to produce, promote, or optimize a particular facet of that concept, such as social justice, common knowledge, or collective well-being. The relative success of such activity can be determine…