Skip to main content

How Artificial Intelligence Can Undermine Security: An Overview of the Intellectual Property Rights and Legal Problems Involved

  • Chapter
  • First Online:
Applications in Ubiquitous Computing

Abstract

Research in biomedical engineering would not have reached the point it is at today if not for the significant contribution of computational technology. Having said that, today, Artificial Intelligence plays a major role in the field of biomedical engineering. Huge amounts of data are collected every second and stored for further query, data mining and are to be operated on by scientists and doctors. These data contain a large amount of sensitive information that often is just available on the internet, open to all. This is where Artificial Intelligence steps in. Artificial Intelligence helps to improve the credibility of the data available and helps to improve the patient’s privacy when the data are stored on the cloud. However, improper and/or excessive use of Artificial Intelligence can lead to unintended consequences. In this chapter, we will be focusing on the general applications of Artificial Intelligence in the various fields of biomedical engineering, the various issues faced with and without Artificial Intelligence, and possible solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. What Is Deep Learning? | How It Works, Techniques & Applications - MATLAB & Simulink. (2019). What is deep learning? | How It Works, Techniques & Applications - MATLAB & Simulink, [ONLINE]. Available at: https://in.mathworks.com/discovery/deep-learning.html#whyitmatters. Accessed 25 July 2019.

  2. Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural Networks, 61, 85–117.

    Article  Google Scholar 

  3. Jackson, C. P. (1985). Introduction to artificial intelligence: Second, enlarged edition (Dover 669 books on mathematics) (pp. 21–24). New York: Dover publications. ISBN 0-486-24864-X.

    Google Scholar 

  4. Hinton, G., Deng, L., Yu, D., Dahl, G., Mohamed, A., Jaitly, N., Senior, A., Vanhoucke, V., Nguyen, P., Sainath, T., & Kingsbury, B. H. (2012). Deep neural networks for acoustic modeling in speech recognition – The shared views of four research groups. IEEE Signal Processing Magazine, 29, 82–97.

    Article  Google Scholar 

  5. Clinical decision support systems | British Columbia Medical Journal. (2019). Clinical decision support systems | British Columbia Medical Journal, [ONLINE]. Available at: https://www.bcmj.org/articles/clinical-decision-support-systems. Accessed 25 July 2019.

  6. The Medical Futurist. (2019). The future of radiology and artificial intelligence – The medical futurist, [ONLINE]. Available at: https://medicalfuturist.com/the-future-of-radiology-and-ai. Accessed 25 July 2019.

  7. Shortliffe, E. H., & Cimino, J. J. (2014). Biomedical informatics: Computer applications in health care and biomedicine (4th ed., pp. 149–151). London: Springer-Verlag. https://doi.org/10.1007/978-1-4471-4474-8. ISBN:978–1–4471-4474-8.

    Book  Google Scholar 

  8. Bashshur, R. L., Mandil, S. H., & Shannon, G. W. (2004). Telemedicine journal and e-health. Telemedicine Journal and e-Health, [Online], 8, 3–4. Available at: https://doi.org/10.1089/15305620252933356. Accessed 27 May 2019.

  9. Langlotz, C. P., Allen, B., Erickson, B. J., Kalpathy-Cramer, J., Bigelow, K., Cook, T. S., Flanders, A. E., Lungren, M. P., Mendelson, D. S., Rudie, J. D., Wang, G., & Kandarpa, K.. (2019). A roadmap for foundational research on artificial intelligence in medical imaging: From the 2018 NIH/RSNA/ACR/The academy workshop. Radiological Society, [Online], 291(3), 1–11. Available at: https://doi.org/10.1148/radiol.2019190613. Accessed 28 May 2019.

  10. PresCouter. (2019). Artificial Intelligence meets drug development. [ONLINE]. Available at: https://www.prescouter.com/2017/05/artificial-intelligence-drug-development/. Accessed 27 May 2019.

  11. Tabatabaei, S. G. H., Dastjerdi, A. V., Wan Kadir, W. M. N., Ibrahim, S., & Sarafian, E. (2010). Security conscious AI-planning-based composition of semantic web services. International Journal of Web Information Systems, 6(3), 203–229.

    Article  Google Scholar 

  12. Osoba, O. A., & William Welser, I. V. (2017). The risks of artificial intelligence to security and the future of work. Santa Monica, CA: RAND Corporation.

    Book  Google Scholar 

  13. Awwalu, J., Garba, A. G., Ghazvini, A., & Rose Atuah, J. (2015). Artificial intelligence in personalized medicine application of AI algorithms in solving personalized medicine problems. International Journal of Computer Theory and Engineering, [Online], 7, 1–5. Accessed 28 May 2019.

    Google Scholar 

  14. Sobia Hamid, D. (2016). The opportunities and risks of artificial intelligence in medicine and healthcare. Communications Summer 2016 The Babraham Institute, University of Cambridge, [Online], 1, 1–4. Available at: http://www.cuspe.org/wp-content/uploads/2016/09/Hamid_2016.pdf. Accessed 28 May 2019.

  15. Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691–697.

    Article  Google Scholar 

  16. Williams, P. A. H., & Woodward, A. J. (2015). Cybersecurity vulnerabilities in medical devices: A complex environment and multifaceted problem. Medical Devices: Evidence and Research (Auckl), 8, 305–316.

    Article  Google Scholar 

  17. Zhang, Q., Qi, Y., Hou, D., Zhao, J., & Han, H. (2007). Uncertain privacy decision about access personal information in pervasive computing environments. In J. Lei, J. Yu, & S. Zhou (Eds.), Proceedings of the 4th international conference on fuzzy systems and knowledge discovery (FSKD 2007) (Vol. 3, pp. 156–160). Haikou, China: IEEE, 24–27 Aug 2007.

    Chapter  Google Scholar 

  18. Hastings, N. E., & Franklin, J. M. (2015). Considerations for identity management in public safety mobile networks. NIST Interagency/Internal Report (NISTIR) – 8014.

    Google Scholar 

  19. Li, J.-h. (2018). Cyber security meets artificial intelligence: A survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462–1474.

    Article  Google Scholar 

  20. Chang, L., & Mogg, T. (2018). TaskRabbit app goes down as it investigates ‘Cybersecurity Incident’. digitaltrends.com

  21. Wyciślik-Wilson, M. (2018). TaskRabbit returns after security breach and reveals ‘personally identifiable information’ was exposed. betanews.com

  22. Detrick, H. (2018). TaskRabbit may have been hacked. What to know about the security breach that forced the platform offline. fortune.com

  23. Brain-Machine, Artificial Intelligence and the Future of Biomedical Engineering Solutions for Health. Retrieved on Sep 2018 from https://events.vtools.ieee.org/m/192547.

  24. Artificial Intelligence in Medical Robotics – Current Applications and Possibilities. Retrieved on May 2019 from https://emerj.com/ai-sector-overviews/artificial-intelligence-medical-robotics/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Praveen Kumar Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gupta, P.K., Prasanna, D.V., Raghunath, S.S. (2021). How Artificial Intelligence Can Undermine Security: An Overview of the Intellectual Property Rights and Legal Problems Involved. In: Kumar, R., Paiva, S. (eds) Applications in Ubiquitous Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-35280-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35280-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35279-0

  • Online ISBN: 978-3-030-35280-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics