{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:19:11Z","timestamp":1730236751909,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1109\/iccst49569.2021.9717405","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T15:36:02Z","timestamp":1645803362000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Artificial Intelligence in Security Technologies: Levels of Intelligent Autonomy and Risk"],"prefix":"10.1109","author":[{"given":"Deborah","family":"Evans","sequence":"first","affiliation":[{"name":"School of Science (Security), Edith Cowan University,Joondalup,Western Australia"}]},{"given":"Michael","family":"Coole","sequence":"additional","affiliation":[{"name":"School of Science (Security), Edith Cowan University,Joondalup,Western Australia"}]}],"member":"263","reference":[{"journal-title":"Building Automation & Control Systems An Investigation into Vulnerabilities Current Practice & Security Management Best Practice","year":"2017","author":"brooks","key":"ref10"},{"journal-title":"Online Exclusive Integrated Security - Not Just an Industry Buzzword Security Today","year":"2015","author":"dowell","key":"ref11"},{"journal-title":"Integrated security systems design A complete reference for building enterprise-wide digital security systems","year":"2014","author":"norman","key":"ref12"},{"journal-title":"Automation","year":"0","key":"ref13"},{"key":"ref14","first-page":"89","article-title":"Challenges and Opportunities for Autonomous Systems in Space","author":"frost","year":"0","journal-title":"Frontiers of Engineering Reports on Leading-Edge Engineering from the 2010 Symposium"},{"key":"ref15","article-title":"Autonomous Weapons Systems: Living a dignified life and dying a dignified death","author":"heyns","year":"2016","journal-title":"Autonomous Weapons Systems Law Ethics Policy"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68677-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52152-3_25"},{"journal-title":"What are the 3 types of AI? A guide to narrow general and super artificial intelligence","year":"2020","author":"o'carroll","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.12.138"},{"journal-title":"Defining Remote Warfare The Rise of the Private Military and Security Industry","year":"2018","author":"kreig","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28285-1_8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0212-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3105-4"},{"journal-title":"Automation Autonomy and Semi-Autonomy A Brief Definition Relative to Robotics and Machine Systems","year":"2019","author":"norris","key":"ref8"},{"journal-title":"Autonomy","year":"0","key":"ref7"},{"journal-title":"Physical Security Principles","year":"2015","key":"ref2"},{"journal-title":"Opportunities and Implications of using Artificial Intelligence in the Establishment of Security Physical Environments","year":"2021","author":"coole","key":"ref1"},{"key":"ref9","article-title":"Staying in the loop: human supervisory control of weapons","author":"sharkey","year":"2016","journal-title":"Autonomous Weapons Systems Law Ethics Policy"},{"journal-title":"Defining the Levels of Adjustable Autonomy A Means of Improving Resilience in an Unmanned Aerial System","year":"2014","author":"chang","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v36i4.2577"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2514\/6.2005-7061"},{"journal-title":"Artificial Intelligence A Modern Approach","year":"2020","author":"russell","key":"ref24"},{"key":"ref23","first-page":"184","article-title":"Are we safe enough in the future of artificial intelligence? A discussion on machine ethics and artificial intelligence safety","volume":"9","author":"k\u00f6se","year":"2018","journal-title":"BRAIN Broad Research in Artificial Intelligence and Neuroscience"},{"key":"ref26","first-page":"93","article-title":"Defence Management and PESTLE analysis","volume":"1","author":"akman","year":"2020","journal-title":"Ante Portas - Security Studies"},{"journal-title":"Artificial intelligence safety and cybersecurity A timeline of AI failures","year":"2016","author":"yampolskiy","key":"ref25"}],"event":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2021,10,11]]},"location":"Hatfield, United Kingdom","end":{"date-parts":[[2021,10,15]]}},"container-title":["2021 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9717366\/9717368\/09717405.pdf?arnumber=9717405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T16:16:19Z","timestamp":1655309779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9717405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iccst49569.2021.9717405","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]}}}