{"id":"https://openalex.org/W4416862102","doi":"https://doi.org/10.48550/arxiv.2508.08583","title":"AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders","display_name":"AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders","publication_year":2025,"publication_date":"2025-08-12","ids":{"openalex":"https://openalex.org/W4416862102","doi":"https://doi.org/10.48550/arxiv.2508.08583"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2508.08583","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.08583","pdf_url":"https://arxiv.org/pdf/2508.08583","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2508.08583","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101989630","display_name":"Hiroya Kato","orcid":"https://orcid.org/0000-0002-9102-1848"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kato, Hiroya","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012143756","display_name":"K. Kita","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kita, Kentaro","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066000044","display_name":"Kento Hasegawa","orcid":"https://orcid.org/0000-0002-6517-1703"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hasegawa, Kento","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5052844875","display_name":"Seira Hidano","orcid":"https://orcid.org/0009-0006-0571-7168"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hidano, Seira","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101989630"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6934000253677368,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6934000253677368,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.04529999941587448,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.01080000028014183,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4246000051498413},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.37700000405311584},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.34060001373291016},{"id":"https://openalex.org/keywords/affect","display_name":"Affect (linguistics)","score":0.2906999886035919},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.27799999713897705}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43070000410079956},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4246000051498413},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.41440001130104065},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.37700000405311584},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3328000009059906},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3084000051021576},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.2906999886035919},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.2712000012397766},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.26930001378059387},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.267300009727478},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.2614000141620636}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2508.08583","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.08583","pdf_url":"https://arxiv.org/pdf/2508.08583","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2508.08583","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.08583","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2508.08583","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.08583","pdf_url":"https://arxiv.org/pdf/2508.08583","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"the":[1,49,68,122,126,132,149,178,185,201],"social":[2,72],"implementation":[3],"of":[4,37,121,161],"AI":[5,15,41,76,95,106,140,162,179,234],"has":[6,17],"been":[7,19,25],"steadily":[8],"progressing,":[9],"research":[10],"and":[11,33,53,71,116,131,193,228],"development":[12],"related":[13,29,74,104],"to":[14,27,47,75,82,105,177,208,220,231],"security":[16,77,96,107,180,235],"also":[18,224],"increasing.":[20],"However,":[21],"existing":[22],"studies":[23],"have":[24],"limited":[26],"organizing":[28],"techniques,":[30],"attacks,":[31],"defenses,":[32],"risks":[34],"in":[35],"terms":[36],"specific":[38],"domains":[39],"or":[40,165],"elements.":[42],"Thus,":[43],"it":[44],"extremely":[45],"difficult":[46],"understand":[48,84,184],"relationships":[50,85],"among":[51,86,102],"them":[52],"how":[54,200],"negative":[55,111,171,187,202],"impacts":[56,73,112,172,203],"on":[57,113,204,210],"stakeholders":[58,157],"are":[59,146,173],"brought":[60],"about.":[61],"In":[62],"this":[63,89],"paper,":[64],"we":[65,91],"argue":[66],"that":[67,98,139,155],"knowledge,":[69],"technologies,":[70],"should":[78,141],"be":[79],"holistically":[80,99],"organized":[81],"help":[83],"them.":[87],"To":[88],"end,":[90],"first":[92],"develop":[93],"an":[94],"map":[97,119,197],"organizes":[100],"interrelationships":[101],"elements":[103,138,154],"as":[108,110,158],"well":[109],"information":[114,127,144],"systems":[115,145,206],"stakeholders.":[117,211],"This":[118],"consists":[120],"two":[123],"aspects,":[124],"namely":[125],"system":[128],"aspect":[129,135],"(ISA)":[130],"external":[133],"influence":[134],"(EIA).":[136],"The":[137,151],"fulfill":[142],"within":[143],"classified":[147],"under":[148],"ISA.":[150],"EIA":[152],"includes":[153],"affect":[156],"a":[159],"result":[160],"being":[163],"attacked":[164],"misused.":[166],"For":[167],"each":[168],"element,":[169],"corresponding":[170],"identified.":[174],"By":[175],"referring":[176,219],"map,":[181],"one":[182],"can":[183],"potential":[186],"impacts,":[188],"along":[189],"with":[190],"their":[191],"causes":[192],"countermeasures.":[194],"Additionally,":[195],"our":[196,221],"helps":[198],"clarify":[199],"AI-based":[205],"relate":[207],"those":[209],"We":[212,223],"show":[213],"some":[214],"findings":[215],"newly":[216],"obtained":[217],"by":[218],"map.":[222],"provide":[225],"several":[226],"recommendations":[227],"open":[229],"problems":[230],"guide":[232],"future":[233],"communities.":[236]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
