Digital Deception: Uncovering the Dark Side of AI in Social Networks

The Dark Side of Digital Surveillance: India’s Cybersecurity in the Age of Artificial Intelligence

Author(s): Ruchi Patira*, Rajani Singh and Manoj Singhal

Pp: 221-230 (10)

DOI: 10.2174/9798898810030125040016

* (Excluding Mailing and Handling)

Abstract

This article provides an overview of cyber security, a topic that has risen in importance since the end of the Cold War due to a confluence of technological advancements and shifts in geopolitical dynamics. The paper uses securitization theory to conceptualize cybersecurity as a separate industry with its own unique set of risks and reference points. It is believed that the collective referent objects of “the state”, “society”, “the country”, and “the economy” provide “network security” and “individual security” their political significance. Through hypersecuritization, daily security procedures, and rectifications, these referent objects are formulated as threats. Next, a case study of what has been called the “first cyber war” against Estonian governmental and commercial organizations in 2007 is used to demonstrate the theoretical framework's practicality. In the realm of IT, cyber security is a crucial component. One of the greatest difficulties now is ensuring the safety of sensitive data. Although the concept of cyber security is more important, it remains elusive. The notions of privacy, information sharing, intelligence collection, and monitoring are often muddled with it in improper ways. This study argues that proper risk management of information systems is essential for adequate cyber security. Threats (who is attacking), vulnerabilities (how the assault will be carried out), and effects (what will be damaged) are the three determinants of the risks involved in any attack (what the attack does). In terms of cyber security, the government's responsibility extends beyond only safeguarding its own networks to also include helping to safeguard private networks. 


Keywords: Cybersecurity, Cyber risk, Hypersecuritization, Information security, Network security.

Related Journals
Related Books
© 2025 Bentham Science Publishers | Privacy Policy