Combating the Effects of Cyber-Psychosis: Using Object Security to Facilitate Critical Thinking
- URL: http://arxiv.org/abs/2503.16510v1
- Date: Fri, 14 Mar 2025 23:17:19 GMT
- Title: Combating the Effects of Cyber-Psychosis: Using Object Security to Facilitate Critical Thinking
- Authors: Robert H. Thomson, Quan Nguyen, Essien Ayanam, Matthew Canham, Thomas C. Schmidt, Matthias Wählisch, Eric Osterweil,
- Abstract summary: Humanity is facing an existential crisis about the nature of truth and reality driven by the availability of information online.<n>We propose that the Internet needs an object security service layer.
- Score: 3.8247956248256094
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Humanity is currently facing an existential crisis about the nature of truth and reality driven by the availability of information online which overloads and overwhelms our cognitive capabilities, which we call Cyber-Psychosis. The results of this Cyber-Psychosis include the decline of critical thinking coupled with deceptive influences on the Internet which have become so prolific that they are challenging our ability to form a shared understanding of reality in either the digital or physical world. Fundamental to mending our fractured digital universe is establishing the ability to know where a digital object (i.e. a piece of information like text, audio, or video) came from, whether it was modified, what it is derived from, where it has been circulated, and what (if any) lifetime that information should have. Furthermore, we argue that on-by-default object security for genuine objects will provide the necessary grounding to support critical thinking and rational online behavior, even with the ubiquity of deceptive content. To this end, we propose that the Internet needs an object security service layer. This proposition may not be as distant as it may first seem. Through an examination of several venerable (and new) protocols, we show how pieces of this problem have already been addressed. While interdisciplinary research will be key to properly crafting the architectural changes needed, here we propose an approach for how we can already use fallow protections to begin turning the tide of this emerging Cyber-Psychosis today!
Related papers
- Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.<n>In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - Deepfake Media Forensics: State of the Art and Challenges Ahead [51.33414186878676]
AI-generated synthetic media, also called Deepfakes, have influenced so many domains, from entertainment to cybersecurity.
Deepfake detection has become a vital area of research, focusing on identifying subtle inconsistencies and artifacts with machine learning techniques.
This paper reviews the primary algorithms that address these challenges, examining their advantages, limitations, and future prospects.
arXiv Detail & Related papers (2024-08-01T08:57:47Z) - Cyber-sensorium: An Extension of the Cyber Public Health Framework [0.5852077003870417]
We draw parallels between the digital network and a biological nervous system essential to human welfare.
Cyberattacks on this system present serious global risks, underlining the need for its protection.
arXiv Detail & Related papers (2024-06-09T22:44:49Z) - Cyberbully and Online Harassment: Issues Associated with Digital Wellbeing [0.0]
This research synthesizes empirical findings from diverse studies to evaluate how innovative technological interventions contribute to reducing the prevalence of cyberbullying.
The study focuses on the effectiveness of these interventions in various settings, highlighting the need for adaptive strategies that respond to the dynamic digital landscape.
arXiv Detail & Related papers (2024-04-29T17:49:49Z) - Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Exploring Cybercriminal Activities, Behaviors and Profiles [2.7195102129095003]
This article explores cybercriminal activities and behavior from a psychology and human aspects perspective.
We examine motivations, psychological and other interdisciplinary concepts as they may impact/influence cybercriminal activities.
arXiv Detail & Related papers (2023-08-30T10:57:19Z) - The Age of Synthetic Realities: Challenges and Opportunities [85.058932103181]
We highlight the crucial need for the development of forensic techniques capable of identifying harmful synthetic creations and distinguishing them from reality.
Our focus extends to various forms of media, such as images, videos, audio, and text, as we examine how synthetic realities are crafted and explore approaches to detecting these malicious creations.
This study is of paramount importance due to the rapid progress of AI generative techniques and their impact on the fundamental principles of Forensic Science.
arXiv Detail & Related papers (2023-06-09T15:55:10Z) - A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems [0.4056667956036515]
Concerns for the resilience of Cyber-Physical Systems in critical infrastructure are growing.
Cyber-resilience aims at ensuring CPS survival by keeping the core functionalities of the CPS in case of extreme events.
We systematically survey recent literature addressing cyber-resilience with a focus on techniques that may be used on CPSs.
arXiv Detail & Related papers (2023-02-10T18:03:20Z) - Physical Adversarial Attack meets Computer Vision: A Decade Survey [55.38113802311365]
This paper presents a comprehensive overview of physical adversarial attacks.
We take the first step to systematically evaluate the performance of physical adversarial attacks.
Our proposed evaluation metric, hiPAA, comprises six perspectives.
arXiv Detail & Related papers (2022-09-30T01:59:53Z) - Towards a New Science of Disinformation [3.7305343461339664]
We discuss how to best address the dangerous impact that deep learning-generated fake audios, photographs, and videos (a.k.a. deepfakes) may have in personal and societal life.
We propose that a new Science of Disinformation is needed, one which creates a theoretical framework both for the processes of communication and consumption of false content.
arXiv Detail & Related papers (2022-03-17T19:10:29Z) - Detecting Cross-Modal Inconsistency to Defend Against Neural Fake News [57.9843300852526]
We introduce the more realistic and challenging task of defending against machine-generated news that also includes images and captions.
To identify the possible weaknesses that adversaries can exploit, we create a NeuralNews dataset composed of 4 different types of generated articles.
In addition to the valuable insights gleaned from our user study experiments, we provide a relatively effective approach based on detecting visual-semantic inconsistencies.
arXiv Detail & Related papers (2020-09-16T14:13:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.