Information Resilience in the Artificial Intelligence Era: A Global Scenario of Cybersecurity Strategies

Mandal, Subhadip, Chakraborty, Kanu, Patra, Swapan Kumar, Upadhyay, Navin and Kumari, Anisha Information Resilience in the Artificial Intelligence Era: A Global Scenario of Cybersecurity Strategies., 2025 . In 14th International CALIBER 2025 Sri Venkateswara University, Tirupati, Andhra Pradesh, November 17-19, 2025 Collaboration with INFLIBNET Centre, Gandhinagar, Gujarat, 14th International CALIBER 2025 Sri Venkateswara University, Tirupati, Andhra Pradesh, November 17-19, 2025. [Conference paper]

[thumbnail of 7.pdf]
Preview
Text
7.pdf - Accepted version

Download (106kB) | Preview

English abstract

In the AI era, there is a constant push and pull between cyber attackers and defenders to create a resilient information system. Some popular big AI giants like Open AI, Google, Microsoft etc and many developed nations such as UK, USA, Singapore etc are working on Cyberattacks. This paper is a review of the policy statements adopted by selected governments and the subsequent policy measures taken by the big multinational corporations. This study adopts a qualitative and descriptive research methodology based on secondary data analysis. The approach is primarily documentary and policy review-based, aiming to explore how various national and international entities are addressing cybersecurity challenges in the context of growing Artificial Intelligence adoption. With this growing use, there is a major apprehension about the safety, security, integrity, and robustness of the information system. So, it is a matter of concern how the information system deals with this issue. This study highlights the impact of AI in modern information resilience systems and focusing on the way to enhance their ability to handle uncertainties, adversarial attacks, and data perturbations.

Item type: Conference paper
Keywords: Artificial Intelligence, Cyber Laws, Cybersecurity, Information Resilience
Subjects: A. Theoretical and general aspects of libraries and information.
B. Information use and sociology of information > BF. Information policy
Depositing user: Dr Swapan kumar Patra
Date deposited: 25 Feb 2026 18:00
Last modified: 25 Feb 2026 18:00
URI: http://hdl.handle.net/10760/47692

References

1. Alnaffar, A. (2024). Cybersecurity Resilience awareness in the era of AI. International Journal of Science and Research (IJSR), 13(3), 244–245. https://doi.org/10.21275/sr24305145928

2. Apple Platform Security. (n.d.). Apple Support. https://support.apple.com/en-in/guide/security/welcome/ web- 83

3. Apple security releases - Apple Support. (2025, June 12). Apple Support. https://support.apple.com/ en-us/100100

4. Black, J. (2023). Past, present and tackling the future of artificial intelligence (AI) in education: maintaining agency and establishing AI laws. Open Journal of Social Sciences, 11(07), 442–464. https://doi.org/ 10.4236/jss.2023.117031

5. Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc Networks, 35, 65–82. https://doi.org/10.1016/j.adhoc.2015.07.012

6. China’s Data Governance and Cybersecurity Regime. (n.d.). http://www.npc.gov.cn/englishnpc/c2759/ c23934/202112/t20211209.

7. Convention on Cybercrime. (2001). https://rm.coe.int/1680081561.

8. CSRC Content Editor. (n.d.). resilience - Glossary | CSRC. https://csrc.nist.gov/glossary/term/resilience

9. Cyber Security. (n.d.). https://www.itgovernance.co.uk/what-is-cybersecurity

10. Cybersecurity Grant Program application. (n.d.). https://openai.com/form/cybersecurity-grant-program/.

11. Data Security Law of the People’s Republic of China. (n.d.). http://www.npc.gov.cn/englishnpc/c2759/ c23934/202112/t20211209_385109.html

12. Digital India Dialogues. (2023). Digital India Act, 2023. In Digital India Dialogues. https:// www.meity.gov.in/writereaddata/files/DIA_Presentation%2009.03.2023%20Final.pdf

13. Fiksel, J. (2015). Resilient by design. In Island Press/Center for Resource Economics eBooks. https:// doi.org/10.5822/978-1-61091-588-5

14. General Assembly adopts landmark resolution on artificial intelligence. (2024, August 30). UN News. https://news.un.org/en/story/2024/03/1147831

15. Helm, J. M., Swiergosz, A. M., Haeberle, H. S., Karnuta, J. M., Schaffer, J. L., Krebs, V. E., Spitzer, A. I., & Ramkumar, P. N. (2020). Machine learning and Artificial intelligence: definitions, applications, and future directions. Current Reviews in Musculoskeletal Medicine, 13(1), 69–76. https://doi.org/10.1007/ s12178-020-09600-8

16. House, W. (2023, November 3). WHAT THEY ARE SAYING: President Biden issues Executive Order on Safe, Secure, and trustworthy artificial intelligence. The White House. https:// bidenwhitehouse.archives.gov/briefing-room/statements-releases/2023/10/31/what-they-are-saying president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/

17. Hüsch, P., Sullivan, J., Royal United Services Institute for Defence and Security Studies, & (ISC)2. (2023a). Global Approaches to Cyber Policy, Legislation and Regulation: A Comparative Overview. In- 84 INFORMATION RESILIENCE IN THE ARTIFICIAL INTELLIGENCE ERA: A GLOBAL SCENARIO OF CYBERSECURITY STRATEGIES Royal United Services Institute for Defence and Security Studies, RUSI Special Resources. https:// static.rusi.org/rusi-global-approaches-to-cyber-special-resource_0.pdf

18. Hüsch, P., Sullivan, J., Royal United Services Institute for Defence and Security Studies, & (ISC)2. (2023b). Global Approaches to Cyber Policy, Legislation and Regulation: A Comparative Overview. In Royal United Services Institute for Defence and Security Studies, RUSI Special Resources. https:// static.rusi.org/rusi-global-approaches-to-cyber-special-resource_0.pdf

19. IT Governance Ltd. (2013). CYBERSECURITY: a CRITICAL BUSINESS RISK [Green Paper]. In IT Governance Green Paper (pp. 2–4). https://www.itgovernance.co.uk/download/Cybersecurity-v4.pdf

20. Jobs, S. (2010). A day in the life of your data [Journal-article]. All Things Digital Conference, 3. https:/ /www.apple.com/privacy/docs/A_Day_in_the_Life_of_Your_Data.pdf

21. Kassim, S. R. B. M., Li, S., & Arief, B. (2023). The use of public data and free tools in National CSIRTs’ operational practices: A systematic literature review. arXiv (Cornell University). https://doi.org/10.48550/ arxiv.2306.07988

22. Kühl, N., Schemmer, M., Goutier, M., & Satzger, G. (2022). Artificial intelligence and machine learning. Electronic Markets, 32(4), 2235–2244. https://doi.org/10.1007/s12525-022-00598-0

23. Laksito, J., Pratiwi, B., & Ariani, W. (2025). Harmonizing Data Privacy Frameworks in Artificial Intelligence: Comparative Insights from Asia and Europe. Perkara., 2(4), 579–588. https://doi.org/10.51903/ perkara.v2i4.2229

24. Landoll, D. (2021). The Security Risk Assessment Handbook. https://doi.org/10.1201/9781003090441

25. Linkov, I., & Kott, A. (2018). Fundamental Concepts of Cyber Resilience: Introduction and Overview. In Springer eBooks (pp. 1–25). https://doi.org/10.1007/978-3-319-77492-3_1

26. Loong, H., Cyber Security Agency of Singapore, The Singapore Cyber Security Inter Association, The Cyber Security Awareness Alliance, The Infocomm Media Development Authority, The Ministry of Communications and Information, The Ministry of Defence, The Ministry of Home Affairs, The Personal Data Protection Commission, The Singapore Police Force, & The Smart Nation and Digital Government Group. (2021). The Singapore Cybersecurity Strategy 2021. https://ccdcoe.org/uploads/2018/10/ Singapore_Cybersecurity_Strategy_2021.pdf

27. Lourens, M., Dabral, A. P., Gangodkar, D., Rathour, N., Tida, C. N., & Chadha, A. (2022). Integration of AI with the Cybersecurity: A detailed systematic review with the practical issues and challenges. International Conference on Contemporary Computing and Informatics, 1290–1295. https://doi.org/ 10.1109/ic3i56241.2022.10073040- 85 INFORMATION RESILIENCE IN THE ARTIFICIAL INTELLIGENCE ERA: A GLOBAL SCENARIO OF CYBERSECURITY STRATEGIES

28. Makam, G. (2023). India’s Evidence Act and the case for joining the Budapest Convention: A comprehensive analysis of cyber evidence. SSRN Electronic Journal. https://doi.org/10.2139/ ssrn.4495729

29. Mandal, S., & Patra, S. K. (2024). Artificial Intelligence and Cybersecurity: A Global Scenario. Preprints. https://doi.org/10.20944/preprints202405.0415.v1

30. Matamis, J. (2024). The International Telecommunications Union (ITU) and cyber accountability. Stimson Center. https://www.stimson.org/2024/the-international-telecommunications-union-itu-and-cyber accountability/

31. McCarthy, J., Minsky, M. L., Rochester, N., & Shannon, C. E. (2006). A proposal for the Dartmouth Summer Research Project on Artificial Intelligence, August 31, 1955. AI Magazine, 27(4), 12. https:// doi.org/10.1609/aimag.v27i4.1904

32. Michalski, R., Carbonell, J., & Mitchell, T. (2013). Machine learning: An Artificial Intelligence Approach. Springer Science & Business Media.

33. Microsoft Security Blog. (2001, May 29). Threat intelligence | Microsoft Security Blog. https:// www.microsoft.com/en-us/security/blog/topic/threat-intelligence/

34. Molden, D., Sharma, E., Shrestha, A. B., Chettri, N., Pradhan, N. S., & Kotru, R. (2017). Advancing regional and transboundary cooperation in the Conflict-Prone Hindu Kush–Himalaya. Mountain Research and Development, 37(4), 502–508. https://doi.org/10.1659/mrd-journal-d-17-00108.1

35. Morabito, V. (2015). Big data and Analytics. In Springer eBooks. https://doi.org/10.1007/978-3-319 10665-6

36. National Cyber Security Policy -2013. (2012). In https://www.meity.gov.in/.

37. Nyström, M., Jouffray, J., Norström, A. V., Crona, B., Jørgensen, P. S., Carpenter, S. R., Bodin, Ö., Galaz, V., & Folke, C. (2019). Anatomy and resilience of the global production ecosystem. Nature, 575(7781), 98–108. https://doi.org/10.1038/s41586-019-1712-3

38. Open AI Security Overview. (n.d.). https://openai.com/security-and-privacy/.

39. PricewaterhouseCoopers. (n.d.). A comparison of cybersecurity regulations: China. PwC. https:// www.pwc.com/id/en/pwc-publications/services-publications/legal-publications/a-comparison-of cybersecurity-regulations/china.html

40. Roesener, A. G., PhD, Bottolfson, C., & Fernandez, G. (2014). Policy for US cybersecurity. In Air Force Research Institute (AFRI), Air & Space Power Journal. https://apps.dtic.mil/sti/pdfs/ADA617837.pdf

41. Singapore - Information and Telecommunications Technology. (2024, January 5). International Trade Administration | Trade.gov. https://www.trade.gov/country-commercial-guides/singapore-information and-telecommunications-technology- 86 INFORMATION RESILIENCE IN THE ARTIFICIAL INTELLIGENCE ERA: A GLOBAL SCENARIO OF CYBERSECURITY STRATEGIES

42. Sontan, N. a. D., & Samuel, N. S. V. (2024). The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities. World Journal of Advanced Research and Reviews, 21(2), 1720–1736. https://doi.org/10.30574/wjarr.2024.21.2.0607

43. Stebila, D. & Apple Inc. (2024). Security analysis of the iMessage PQ3 protocol [Journal-article]. https:/ /security.apple.com/assets/files/Security_analysis_of_the_iMessage_PQ3_protocol_Stebila.pdf

44. Street, P. M. O. 1. D. (2025, February 13). The Bletchley Declaration by countries attending the AI Safety Summit, 1-2 November 2023. GOV.UK. https://www.gov.uk/government/publications/ai-safety summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety summit-1-2-november-2023

45. Tan, L., Yu, K., Ming, F., Cheng, X., & Srivastava, G. (2021). Secure and Resilient Artificial Intelligence of Things: A HoneyNet approach for threat detection and situational awareness. IEEE Consumer Electronics Magazine, 11(3), 69–78. https://doi.org/10.1109/mce.2021.3081874

46. The Bletchley Declaration – everything AI. (n.d.). https://thebletchleydeclaration.com/

47. Van Den Adel, M. J., De Vries, T. A., & Van Donk, D. P. (2021). Resilience in interorganizational networks: dealing with day-to-day disruptions in critical infrastructures. Supply Chain Management an International Journal, 27(7), 64–78. https://doi.org/10.1108/scm-03-2021-0136

48. Vercelli, A. & United Nations. (2024). United Nations, artificial intelligences and regulations: analysis of the General Assembly AI Resolutions and the Final Report of the Advisory Body on AI. In INHUS CONICET, Grupo CITEUS, Facultad De Humanidades / Universidad Nacional De Mar Del Plata [Journal article]. https://ceur-ws.org/Vol-3881/paper11.pdf

49. Vu, C. (2016). CYBER SECURITY IN SINGAPORE. https://www.rsis.edu.sg/wp-content/uploads/2016/ 12/PR170217_Cybersecurity-in-Singapore.pdf

50. What is Cybersecurity? Key Concepts Explained | Microsoft Security. (n.d.). https://www.microsoft.com/ en-us/security/business/security-101/what-is-cybersecurity

51. Wikipedia contributors. (2024, June 21). International Multilateral Partnership against Cyber Threats. Wikipedia. https://en.wikipedia.org/wiki/ International_Multilateral_Partnership_Against_Cyber_Threats


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item