How secure is code generated by chatgpt?
R Khoury, AR Avila, J Brunelle… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In recent years, large language models have been responsible for great advances in the
field of artificial intelligence (AI). ChatGPT in particular, an AI chatbot developed and recently …
field of artificial intelligence (AI). ChatGPT in particular, an AI chatbot developed and recently …
Transparent predictions
TZ Zarsky - U. Ill. L. Rev., 2013 - HeinOnline
Can human behavior be predicted? A broad variety of governmental initiatives are using
computerized processes to try. Vast datasets of personal information enhance the ability to …
computerized processes to try. Vast datasets of personal information enhance the ability to …
[HTML][HTML] Ethics in cybersecurity research and practice
K Macnish, J Van der Ham - Technology in society, 2020 - Elsevier
This paper critiques existing governance in cyber-security ethics through providing an
overview of some of the ethical issues facing researchers in the cybersecurity community …
overview of some of the ethical issues facing researchers in the cybersecurity community …
Identity theft: Making the known unknowns known
CJ Hoofnagle - Harv. JL & Tech., 2007 - HeinOnline
There is widespread agreement that identity theft causes financial damage to consumers,
creditors, retail establishments, and the economy as a whole. 2 The Federal Trade …
creditors, retail establishments, and the economy as a whole. 2 The Federal Trade …
E-Commerce, cyber, and electronic payment system risks: lessons from PayPal
LJ Trautman - UC Davis Bus. LJ, 2015 - HeinOnline
By now, almost without exception, every business has an internet presence, and is likely
engaged in e-commerce. What are the major risks perceived by those engaged in e …
engaged in e-commerce. What are the major risks perceived by those engaged in e …
Crime-facilitating speech
E Volokh - Stan. L. Rev., 2004 - HeinOnline
(a) A textbook, 1 magazine, Web site, or seminar describes how people can make bombs
(conventional 2 or nuclear3), make guns, 4 make drugs, 5 commit contract murder, 6 engage …
(conventional 2 or nuclear3), make guns, 4 make drugs, 5 commit contract murder, 6 engage …
Information disclosure and the diffusion of information security attacks
S Mitra, S Ransbotham - Information Systems Research, 2015 - pubsonline.informs.org
With the nearly instantaneous dissemination of information in the modern era, policies
regarding the disclosure of sensitive information have become the focus of significant …
regarding the disclosure of sensitive information have become the focus of significant …
Cybersecurity: What about US policy?
LJ Trautman - U. Ill. JL Tech. & Pol'y, 2015 - HeinOnline
During December 2014, just hours before the holiday recess, the US Congress passed five
major legislative proposals designed to enhance US cybersecurity. Following signature by …
major legislative proposals designed to enhance US cybersecurity. Following signature by …
Is cyberattack the next Pearl Harbor
LJ Trautman - NCJL & Tech., 2016 - HeinOnline
Central Intelligence Agency Director, Leon Panetta, states in his Secretary of Defense
confirmation testimony before the Senate Armed Services Committee that,"[t] he next Pearl …
confirmation testimony before the Senate Armed Services Committee that,"[t] he next Pearl …