مطالب مرتبط با کلیدواژه

Cyber Security


۱.

Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach(مقاله علمی وزارت علوم)

نویسنده:

کلیدواژه‌ها: Cyber Text Virtual Correspondence Cyber Security Cyber Forgery CDA (Critical Discourse Analysis)

حوزه‌های تخصصی:
تعداد بازدید : ۲۱۶ تعداد دانلود : ۱۳۸
Looking through the lens of forensic pragmatics, this study aims to critically analyze a typical textual sample of cyber-fraud correspondence as addressed to a candidate email-user. As such, the virtual correspondence which is written by a seemingly legitimate sender seems to be authorized in its claims to the extent that even the Gmail spam-identifying system has not report it as devious. Due to the questionable subject of such virtual correspondence(s) (VC) or cyberspace correspondence(s) (CC) being issued, that is the claim of offering a huge winning bid to the addressee and the significance of identifying the authenticity of such abrupt proposals, it can be hypothesized that such a text consists of fraudulent claims and therefore is subject to forensic cyber-crime examination. As such, the present study plans to provide a discursive analysis of an authentic sample based on a CDA procedure itself based on Fairclough’s (1989) formula presented in his influential book titled ‘Language and Power’. There are two main questions this study has aimed to answer: 1) How the text at hand lends itself to CDA analysis in terms of the main tenets of discursive manipulation proposed in Fairclough’s CDA formula? and 2) What manipulative patterns might be detected in a discursive piece of email correspondence allegedly presumed to be fraudulent. The main findings of this study are: 1) The lexical, sentential, and textual levels in the Fairclough’s CDA formula are applicable to the email-correspondence text at hand, though modified in accordance with the text’s discoursal specifications, 2) The outcome of the CDA analysis of the cyberspace correspondence sample under study provided definitive clues to support the existence of manipulative intention(s) hidden in the text at hand, 3) The results might be applied to similar pieces of discourse at different levels of lexical, sentential, and textual composition.
۲.

AI Embassies: A New Frontier in Cyber Domain

نویسنده:

کلیدواژه‌ها: AI embassy consular services Cyber Security diplomacy virtual embassy

حوزه‌های تخصصی:
تعداد بازدید : ۳۰ تعداد دانلود : ۲۱
Background: The world is rapidly becoming more intelligent, and AI is penetrating many fields, including international affairs. Based on this, we will soon witness the emergence of a new generation of embassies, namely AI embassies.Aims: This article answers the main question: "What are the prerequisites and requirements for using AI in embassies?"Methodology: This research, conducted using a qualitative approach and socio-technical theory, examines changes around embassies and operational experiences in this area and concludes that ambassadors need to align with modern developments to succeed in their diplomatic missions.Findings: The research findings indicate that a comprehensive and accurate understanding of the developments in the host country and benefiting from AI suggestions for developing relations with the government and people of the host country are among the advantages of AI embassies. Security issues and the need for skilled human resources are some of the challenges of AI embassies. Finally, the main achievement of this article is to provide an operational framework for the responsible use of AI in embassies.Conclusion: Designing and implementing an artificial intelligence strategy, ensuring data quality and security, empowering embassy staff, and continuous monitoring and evaluation are the most critical components of this proposed framework.