Artificial IntelligenceDesign and Solution forRisk and Security
Other books by Archie Addo published by Business Expert Press
Artificial Intelligence for Risk Management
ISBN: 9781949443516
https://www.businessexpertpress.com/books/artificial-intelligence-forrisk-management/
Artificial Intelligence for Security
ISBN: 9781951527266
https://www.businessexpertpress.com/books/artificial-intelligence-forsecurity/
Artificial IntelligenceDesign and Solution forRisk and Security
Archie Addo, Srini Centhala, andMuthu Shanmugam
Artificial Intelligence Design and Solution for Risk and Security
Copyright Business Expert Press, LLC, 2020.
Cover image licensed by Ingram Image, StockPhotoSecrets.com
All rights reserved. No part of this publication may be reproduced,stored in a retrieval system, or transmitted in any form or by anymeanselectronic, mechanical, photocopy, recording, or any otherexcept for brief quotations, not to exceed 400 words, without the priorpermission of the publisher.
As part of the Business Law Collection, this book discusses general principlesof law for the benefit of the public through education only. This bookdoes not undertake to give individual legal advice. Nothing in this bookshould be interpreted as creating an attorney-client relationship with theauthor(s). The discussions of legal frameworks and legal issues is not intendedto persuade readers to adopt general solutions to general problems,but rather simply to inform readers about the issues. Readers should notrely on the contents herein as a substitute for legal counsel. For specificadvice about legal issues facing you, consult with a licensed attorney.
First published in 2020 by
Business Expert Press, LLC
222 East 46th Street, New York, NY 10017
www.businessexpertpress.com
ISBN-13: 978-1-95152-748-8 (paperback)
ISBN-13: 978-1-95152-749-5 (e-book)
Business Expert Press Business Law and Corporate Risk ManagementCollection
Collection ISSN: 2333-6722 (print)
Collection ISSN: 2333-6730 (electronic)
Cover and interior design by Exeter Premedia Services Private Ltd.,Chennai, India
First edition: 2020
10 9 8 7 6 5 4 3 2 1
Printed in the United States of America.
Abstract
Various risks, security issues, and disasters have occurred environmentally and in the corporate world (Peters 2018; Gheuens et al. 2019). Mitigation can be used for risks and security occurrences if using an appropriate approach. There must be a specific approach to mitigate the situation and further recommend mitigation strategies. Experts are required to identify the associated risks and securities early enough to safeguard the situation and minimize the impact. Risk and security management plays a major role in situations of uncertainty. The following are some relevant questions to risk and security management: How can this situation be forecasted and taken care of early in similar situations? Can these occurrences be captured historically? Can such patterns of occurrences be identified? Can the data relating to the occurrences be captured? Can the data be used to predict future occurrences? Can the relevance of the data be an important factor? Is security important? What happens if the data are manipulated? How are the data manipulated? How can the data be protected and secured? Security is the driving factor in risk management and plays an important role in the data.
Various types of risk and security apply to various industries, business functions, roles, and responsibilities. This book intends to illustrate top business cases and use cases that apply to respective industries by suggesting ways to define, analyze, monitor, control, and mitigate risk (Morosan and DeFranco 2019; Aydos et al. 2019). This approach mitigates risk using data and by putting corrective action in place. Such analysis takes time because humans cannot quickly analyze huge amounts of data. People can use data science, data analytics, and machine learning (ML) algorithms to speed the process.
Artificial intelligence (AI) enables machines to learn from previous human experiences through continuous learning from new sets of input data. The development of mathematical algorithms has led to the marked creation of ML and to the AI revolution today.
In this book, AI will be used to mitigate risks through various case studies that the reader will understand and benefit from. AI produces effective and dramatic results in business. Many organizations desire to understand and improve risk management skills to improve their chances of handling risk.
Risk and security has become important everywhere because of the large volume of data, different velocity, and variety of data. These aspects of life appear to be growing larger and more frequent and are often accompanied by negative impacts. People can use an undetermined amount of risk to strengthen their position. The range and breadth of risk and security creates havoc everywhere in the world, and on a variety of projects. Risk and security management is important in an organization because without it, the organization may have trouble defining its objectives. The most important reason for strategy implementation is fear of financial loss. This book focuses on problem statements with appropriate use cases and proposes AI solutions using data science and ML approaches.
In this book, we hope to provide concrete answers to the crucial questions facing so many organizations: Where are these risks and security issues and what can be done to lower their impacts? Is AI part of the answers to the risk and security mitigations?
Keywords
project management; construction management; program management; skills development; risk, security; artificial intelligence; analytics; machine learning; mitigation; performance review; data science, and business intelligence
Contents
Our experts on artificial intelligence (AI) designs and solutions for risk and security have worked across the corporate world to acquire knowledge and expertise. AI and risk researchers have had a profound impact on our thinking and on the contents of this book. Subsequently, serving many corporate customers has greatly influenced the preparation of this material.
Thank you to our parents, Godson Addo, Mary (Vanderpuije) Addo, Seetharaman Centhala, Thulasi Centhala, K. Shanmugam, and S. Saroja, for encouraging us to get an education and work diligently in our field of work. We do not think we would have made it this far without their support.
We would like to extend gratitude to our families: Louvaine Addo, Mala Srini, and Kavitha Muthu; Archies and Srinis children: Koushik Seethula, Shashank Seethula, and Srima Seethula; and Muthus children: Maanasa Muthu and Sarvesh Muthu for their collective patience with our busy schedules.
Thank you to Editide for copyediting. We would like to extend gratitude to Venkat and everyone at Bizstats Technologies Pvt. Ltd. who enabled us to be a Software-as-a-Service BizStats.AI company, which provided major input to write this book.
- Target audience
- What do you get from the book?
- What this book covers?
- This books mind map
- Organization of chapters
- Artificial intelligence (AI) project architecture and design
- Introduction to risk
- Introduction to security
- Introduction to the AI knowledge base
- How AI, risk, and security come together