Future Trends and Challenges in AI and Machine Learning for Export Controls
Expert-defined terms from the Certificate in AI and Machine Learning in UK Export Controls course at LearnUNI. Free to read, free to share, paired with a globally recognised certification pathway.
Artificial Intelligence (AI) #
The simulation of human intelligence processes by machines, especially computer systems. These processes include learning (the acquisition of information and rules for using the information), reasoning (using the rules to reach approximate or definite conclusions), and self-correction.
Machine Learning (ML) #
A subset of AI that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. It focuses on the development of computer programs that can access data and use it to learn for themselves.
Deep Learning (DL) #
A subset of ML that makes the computation of multi-layer neural networks feasible. It is responsible for advances in image and speech recognition.
Supervised Learning #
A type of ML where the AI is trained using labeled data, i.e., a dataset that has been classified or categorized.
Unsupervised Learning #
A type of ML where the AI is trained using unlabeled data, i.e., a dataset that has not been classified or categorized.
Reinforcement Learning #
A type of ML where an agent learns to behave in an environment, by performing certain actions and observing the results/rewards.
Natural Language Processing (NLP) #
A field of AI that focuses on the interaction between computers and human language, in particular how to program computers to process and analyze large amounts of natural language data.
Computer Vision #
A field of AI that focuses on the ability of computers to interpret and understand the visual world.
Robotic Process Automation (RPA) #
The use of software with AI and ML capabilities to handle high-volume, repetitive tasks that previously required humans to perform.
Explainable AI (XAI) #
AI systems whose actions can be understood by human experts. XAI is in contrast to the "black box" nature of some AI systems.
Bias #
A prejudice in the data, algorithms, or interpretation of results that leads to a systematic deviation from the truth.
Ethics in AI #
The set of values, principles, and guidelines that AI practitioners should adhere to in order to ensure that AI systems are designed and used in a way that is beneficial to humanity.
General Data Protection Regulation (GDPR) #
A regulation in EU law on data protection and privacy in the European Union and the European Economic Area.
AI Governance #
The system of oversight and decision-making that ensures AI systems are developed and used in a responsible and ethical manner.
AI Regulation #
The laws, rules, and guidelines that govern the development, deployment, and use of AI systems.
AI National Strategy #
A country's plan for the development and use of AI, including research and development, education and training, and ethical and legal considerations.
AI in Export Controls #
The use of AI and ML in the identification, tracking, and enforcement of export controls, including the detection of potential violations and the prediction of future risks.
Dual #
Use Goods: Goods, software, and technology that can be used for both civil and military purposes.
Export Controls #
The laws, regulations, and policies that govern the transfer of goods, software, and technology across international borders.
End #
Use Controls: Export controls that restrict the transfer of goods, software, and technology to certain end-users or for certain end-uses.
Sanctions #
Restrictive measures imposed by a country or international organization on another country, group, or individual.
Compliance #
The act of adhering to laws, regulations, and policies, including export controls.
Risk Assessment #
The process of identifying, analyzing, and prioritizing risks in order to make informed decisions about their management.
Supply Chain Security #
The measures taken to protect the supply chain from theft, fraud, and other security threats.
Trade #
Based Money Laundering (TBML): The use of trade transactions to disguise the proceeds of illegal activities.
Intellectual Property (IP) #
Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Non #
Proliferation: The prevention of the spread of nuclear, chemical, and biological weapons and their delivery systems.
Technology Transfer #
The conveyance of technology from one organization to another, including through the sale, lease, or license of technology.
Cybersecurity #
The practice of protecting internet-connected systems, including hardware, software, and data, from theft, damage, or unauthorized access.
Data Privacy #
The protection of personal data, including the right to control how it is collected, used, and shared.
Data Protection #
The measures taken to protect data from unauthorized access, corruption, or destruction.
Data Localization #
The requirement that data be stored or processed within a certain country or region.
Data Sovereignty #
The concept that a nation has sovereignty over the data of its citizens and residents.
Data Breach #
The unauthorized access, use, disclosure, disruption, modification, or destruction of data.
Data Mining #
The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
Data Analytics #
The extraction of insights from data through the use of statistical analysis, computational algorithms, and machine learning.
Data Science #
A field of study that involves the extraction of knowledge from data.
Big Data #
Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
Cloud Computing #
The delivery of different services through the internet, including data storage, servers, databases, networking, and software.
Internet of Things (IoT) #
The network of physical devices, vehicles, buildings, and other items embedded with electronics, software, sensors, and network connectivity that enable these objects to collect and exchange data.
5G #
The fifth generation of wireless technology, characterized by faster speeds, lower latency, and the ability to connect more devices simultaneously.
Quantum Computing #
A type of computation that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
Blockchain #
A decentralized, digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.
Cyber Threat Intelligence (CTI) #
The information related to potential or current attacks, which threaten an organization's security.
Cyber Threat Hunting #
The process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.
Cyber Threat Emulation #
The process of using known threat indicators to simulate attacks against a system or network in order to test its defenses.
Cyber Threat Modeling #
The process of identifying, quantifying, and addressing the security risks associated with a system or application.
Cyber Threat Simulation #
The process of simulating cyber threats in a controlled environment in order to test and improve an organization's cybersecurity posture.
Cybersecurity Operations Center (SOC) #
A team of experts who monitor and analyze an organization's security posture on an ongoing basis.
Cybersecurity Framework #
A set of guidelines and best practices for managing cybersecurity risks.
Cyber Hygiene #
The practices and behaviors that individuals and organizations should follow in order to maintain good cybersecurity hygiene, such as using strong passwords, keeping software up to date, and being cautious when clicking on links or downloading attachments.
Cyber Insurance #
Insurance that covers an organization's losses related to cyber incidents, including data breaches, business interruption, and network damage.
Cyber Risk Management #
The process of identifying, assessing, and prioritizing cyber risks, and implementing measures to mitigate or transfer those risks.
Cybercr #
Cybercr