Search

Browse Subject Areas

For Authors

Submit a Proposal

Conversational Artificial Intelligence

Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Anand Rajavat, Mary Sowjanya Alamanda, Kotagiri Srividya, and K. Sakthidasan Sankaran
Copyright: 2024   |   Status: Published
ISBN: 9781394200566  |  Hardcover  |  
755 pages
Price: $225 USD
Add To Cart

One Line Description
This book presents the need for, design, and application of conversational artificial intelligence (AI). Expert knowledge is shared on leading innovations in natural language processing (NLP) and machine learning (ML) techniques that are frequently combined with more traditional, static kinds of interactive technology, such as chatbots, to create conversational AI.

Audience
Academic researchers, research scholars, practitioners, and students working towards the security of automated speech recognition systems and chatbots, designers of autoboot technologies for OSN platforms, and all key stakeholders working on intelligent engineering solutions

Description
Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system to help customers through either a spoken or typed interface. Conversational chatbots that respond to questions promptly and accurately to help customers are a fascinating development since they make the customer service industry somewhat self-sufficient. A well-automated chatbot can decimate staffing needs, but creating one is a time-consuming process. Voice recognition technologies are becoming more critical as AI assistants like Alexa become more popular. Chatbots in the corporate world have advanced technical connections with clients thanks to improvements in artificial intelligence. However, these chatbots’ increased access to sensitive information has raised serious security concerns. Threats are one-time events such as malware and DDOS (Distributed Denial of Service) assaults. Targeted strikes on companies are familiar and frequently lock workers out. User privacy violations are becoming more common, emphasizing the dangers of employing chatbots. Vulnerabilities are systemic problems that enable thieves to break in. Vulnerabilities allow threats to enter the system, hence they are inextricably linked. Malicious chatbots are widely used to spam and advertise in chat rooms by imitating human behavior and discussions, or to trick individuals into disclosing personal information like bank account details.

Back to Top
Author / Editor Details
Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit.

Rajesh Kumar Chakrawarti, PhD, is a professor and the Dean of the Department of Computer Science & Engineering, Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of industry and academic experience and has published over 100 research papers and chapters in books.

Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University, Coordinator and Adjunct Professor, Utkal University, Bhubaneswar, India. He has over 23 years of academic experience and has authored textbooks, book chapters, and papers for journals and conferences. He has been a visiting doctoral fellow at the University of California, USA, and he has more than 30 patents to his credit.

Anand Rajavat, PhD, is Dean of Shri Vaishnav Vidyapeeth Vishwavidyalaya University and a professor and Director of Shri Vaishnav Institute of Information Technology of Shri Vaishnav Vidyapeeth Vishwavidyalaya University, Indore, India. He has over 22 years of teaching and industry experience, and he has authored or co-authored more than 110 publications. He has been a reviewer on numerous journals and has won numerous awards.

Mary Sowjanya Alamanda, PhD, is an associate professor in the Department of Computer Science and Systems Engineering at Andhra University College of Engineering, Visakhapatnam, India. She has four patents to her credit and has published more than 80 research publications in scholarly journals and conferences.

Back to Top

Table of Contents
Preface
1. A Glance View on Cloud Infrastructures Security and Solutions

Srinivasa Rao Gundu, Charanarur Panem and J. Vijaylaxmi
1.1 Introduction
1.2 Methodology
1.3 Literature Review
1.4 Open Challenges
1.5 Recommendations
1.6 Conclusion
Acknowledgments
References
2. Artificial Intelligence Effectiveness for Conversational Agents in Healthcare Security
Ahmad Mateen Buttar and Abdul Hyee
2.1 Introduction
2.2 Types of AI Relevance to Healthcare
2.2.1 Machine Learning (ML)—Neural Networks and Deep Learning
2.2.2 Rule-Based Expert System
2.2.3 Robotic Process Automation
2.3 The Future of AI in Healthcare
2.4 Ways of Artificial Intelligence that Will Impact Healthcare
2.4.1 Unifying Mind and Machine Using BCIs
2.4.2 Radiology’s Next Generation
2.4.3 Developing the Immunotherapy Treatment
2.4.4 Tracking Health with Personal and Portable Devices
2.5 AI Models
2.5.1 Artificial Neural Network
2.5.2 Zero Trust Technology Application for AI Medical Research
2.6 Compare E-Cohort Findings on Wearables and AI in Healthcare
2.6.1 Results
2.6.1.1 Participant Characteristics
2.7 Ethical Concerns of AI in Healthcare
2.8 Future in Healthcare
2.9 Conclusion
References
3. Conversational AI: Security Features, Applications, and Future Scope at Cloud Platform
Ahmad Mateen Buttar, Faisal Shahzad and Uzma Jamil
3.1 Introduction
3.2 How Does Conversational Artificial Intelligence (AI) Work?
3.3 The Conversational AI Components
3.4 Uses of Conversational AI
3.5 Advantages of Conversational AI
3.5.1 Cost-Effectiveness
3.5.2 Enhanced Sale and Customer Engagement
3.5.3 Scalability
3.5.4 Detect and Prevent Cyberattacks Through AI
3.5.5 Businesses Benefit from Automated Response Work
3.6 Challenges with Conversational Artificial Intelligence
3.7 Risks Associated with Conversational AI
3.7.1 5D-Model for Discretion
3.7.2 User Consciousness
3.7.3 RFID Protects Privacy and Security
3.7.4 Data Aggregation
3.7.5 Stakeholder Model
3.7.6 2 × 2 Framework
3.7.7 Framework for Mobile Cloud
3.7.8 Changes to Pseudonyms in Intelligent Transportation Systems
3.7.9 Homomorphic Encryption
3.7.10 Three-Layer Model
3.7.11 Linear Algebra
3.7.12 Continuous Streaming Data
3.7.13 DBMS Defense Against Insider Threats
3.7.14 Transaction Data Anonymization
3.7.15 D-Mash Model
3.7.16 A Safe Cryptosystem Based on Lattice
3.8 Proposed Model for Conversational AI in Cloud Platform
3.9 Conclusion
3.10 Future Work
References
4. Unsupervised BERT-Based Granular Sentiment Analysis of Literary Work
N. Shyamala Devi and K. Sharmila
4.1 Introduction
4.2 Related Works
4.3 Text Extraction
4.4 Data Preprocessing
4.5 Sentiment Analysis on Literary Works
4.6 TF-IDF Vectorizer
4.7 Fine-Grained Sentiment Analysis on Literary Data
4.8 BERT Classifier for Unsupervised Learning
4.9 Conclusion
References
5. Extracting and Analyzing Factors to Identify the Malicious Conversational
AI Bots on Twitter

Gitika Vyas, Piyush Vyas, Prathamesh Muzumdar, Anitha Chennamaneni, Anand Rajavat and Romil Rawat
5.1 Introduction
5.2 Literature Review
5.3 Methods
5.4 Results and Discussion
5.5 Conclusion and Future Direction
References
6. Evolution and Adoption of Conversational Artificial Intelligence in the Banking Industry
Neha Aggarwal and Kriti Bhaswar Singh
6.1 Introduction
6.2 Significance of Artificial Intelligence
6.3 Conversational AI in the Indian Banking Industry
6.4 Conversational AI in Use in Various Companies
6.5 Conclusion
References
7. Chatbots: Meaning, History, Vulnerabilities, and Possible Defense
Divya Nair
7.1 Understanding Chatbots
7.2 History of Chatbots
7.3 Vulnerabilities and Security Concerns of Chatbots
7.4 Possible Defense Strategies
7.5 Conclusion
References
8. Conversational Chatbot-Based Security Threats for Business and Educational Platforms and Their Counter Measures
Hriakumar Pallathadka, Domenic T. Sanchez, Larry B. Peconcillo, Jr., Malik Jawarneh, Julie Anne T. Godinez and John V. De Vera
8.1 Introduction
8.2 Chatbot Applications in Education, Business Management, and Health Sector
8.2.1 Chatbots for Education
8.2.2 Healthcare Domain Chatbots
8.2.3 E-Commerce Applications
8.2.4 Customer Support
8.3 Security and Privacy in Chatbot
8.4 Related Work
8.5 Methodology
8.6 Results and Discussion
8.7 Conclusion
References
9. Identification of User Preference Using Human–Computer Interaction Technologies and Design of Customized Reporting for Business Analytics Using Ranking Consistency Index
Martin Aruldoss, Miranda Lakshmi Travis and Prasanna Venkatesan Venkatasamy
9.1 Introduction
9.2 Literature Review
9.3 Design of Metric for Ranking Consistency Index
9.4 Experimentation
9.5 Results and Discussion
9.6 Conclusion
References
10. Machine Learning for Automatic Speech Recognition
Hrishitva Patel, Ramakrishnan Raman, Malik Jawarneh, Arshiya S. Ansari, Hriakumar Pallathadka and Domenic T. Sanchez
10.1 Introduction
10.2 Related Work
10.3 Methodology
10.4 Results
10.5 Conclusion
References
11. Conversational Artificial Intelligence at Industrial Internet of Things
Dhirendra Siddharth, DilipKumar Jang Bahadur Saini, Mummadi Ramchandra and Summathi Loganathan
11.1 Introduction
11.1.1 What is Conversational AI?
11.1.2 What Does Conversational AI Do?
11.1.3 How Does Conversational AI Work?
11.2 Technology Components Used in Conversational AI
11.2.1 Natural Language Processing (NLP)
11.2.2 Advanced Dialog Management (ADM)
11.2.3 Machine Learning (ML)
11.2.4 Automatic Speech Recognition (ASR)
11.3 Benefits of Conversational AI
11.3.1 Improved Scalability
11.3.2 Cost-Efficient Technology
11.3.3 Improved User Engagement
11.3.4 Better Accessibility
11.4 How to Create Conversational AI?
11.5 Conversational Platforms and Internet of Things: Relevance and Benefits
11.5.1 Benefits of Implementing Chatbots with the IoT Interface
11.6 Internet of Things Status for Industry
11.6.1 The Impact of IIoT on Operational Effectiveness
11.6.2 Evolution of Legacy Systems
11.6.3 Increased Efficiency in Energy
11.6.4 Intelligent Data Analytics
11.6.5 Support Human Workers, Cobots are Connected
11.6.6 Smart Technologies (Digital Twins) are Becoming More Popular
11.6.7 The IIoT Landscape is Changing Due to Edge Computing
11.6.8 Adoption Hurdles and Common Pitfalls
11.7 Scope of IIoT in Future
11.7.1 The Effect of IIoT on Research and Development
11.8 Work of IIoT with Additional New Innovations
11.8.1 Manufacturing as a Service with IIoT
11.8.2 Cloud and Edge Computing Together
11.8.3 Prevention-Based Service
11.8.4 Equipment, Tool, and Inventory Use in Global Positioning System (GPS)
11.9 Conclusion
References
12. Performance Analysis of Cloud Hypervisor Using Network Package Workloads in Virtualization
J. Mary Ramya Poovizhi and R. Devi
12.1 Introduction
12.2 A Related Study on Energy Efficiency
12.3 Motivation
12.4 Experiment Methodology and Setup
12.4.1 Work Setup
12.5 Results and Discussion
12.5.1 Observation of Windows
12.5.2 Observation on Ubuntu
12.6 Conclusion
References
13. Evaluation of Chabot Text Classification Using Machine Learning
P. Kumaraguru Diderot, K. Sakthidasan Sankaran, Malik Jawarneh, Hriakumar Pallathadka, José Luis Arias-Gonzáles and Domenic T. Sanchez
13.1 Introduction
13.2 Literature Survey
13.2.1 Optimization Techniques for Chatbot Text Feature Selection
13.2.2 Chatbot Text Classification Using Machine Learning
13.2.3 Text Clustering Techniques
13.3 Methodology
13.4 Results
13.5 Conclusion
References
14. Enhanced Security in Chatbot
Ambika N.
14.1 Introduction
14.2 Architecture of Chatbots
14.3 Working of Chatbots
14.4 Background
14.5 Literature Survey
14.6 Proposed System
14.7 Analysis of the Work
14.8 Future Work
14.9 Conclusion
References
15. Heart Disease Prediction Using Ensemble Feature Selection Method
and Machine Learning Classification Algorithms

A. Lakshmi and R. Devi
15.1 Introduction
15.2 Review of Literature
15.3 Proposed Methodology
15.3.1 Data Description
15.3.2 Data Preprocessing
15.3.3 Feature Selection
15.3.4 Classification Algorithms
15.4 Experimental Results
15.5 Conclusion
References
16. Conversational AI: Dialoguing Most Humanly With Non-Humans
Rehan Khan, Shadab Pasha Khan and Syed Adnan Ali
16.1 Introduction
16.2 History
16.3 Chatbot vs. Conversational AI
16.4 Dialogue Systems
16.5 Human Computer Interaction
16.6 Artificial Intelligence
16.7 Components of Conversational AI
16.8 Frameworks, Models, and Architectures
16.9 Conclusion
References
17. Counterfeit Pharmaceutical Drug Identification
Sajidha S. A., Aakif Mairaj, Amit Kumar Tyagi, A. Vijayalakshmi, Nisha V. M., Siddharth Nair, C.K.M. Ganesan, Ram Gunasekaran and Hitarth Menon
17.1 Introduction
17.1.1 Related Works
17.2 Materials and Methods
17.2.1 Data Description
17.2.2 Proposed Method
17.2.2.1 Preprocessing
17.2.2.2 Optical Character Recognition
17.2.2.3 Named Entity Recognition
17.2.2.4 Hash Functions
17.3 Results and Discussion
17.4 Conclusion
References
18. Advanced Security Solutions for Conversational AI
Ranjana Sikarwar, Harish Kumar Shakya, Ajay Kumar and Anjali Rawat
18.1 Introduction
18.1.1 Conversational AI Vulnerability
18.2 Background
18.3 Components of Conversational AI
18.4 Challenges with Conversational AI
18.5 Conclusion
References
19. Security Threats and Security Testing for Chatbots
Domenic T. Sanchez and Rodel S. Sartagoda
19.1 Introduction
19.2 Related Work
19.3 Vulnerability Assessment Tools
19.3.1 OpenVAS
19.3.2 Acunetix Vulnerability Scanner
19.3.3 Zaproxy by OWASP
19.3.4 Burpsuite by Portswigger
19.4 Penetration Testing
19.4.1 Types of Penetration Test
19.4.1.1 Black Box Testing
19.4.1.2 White Box Testing
19.4.1.3 Gray Box Testing
19.4.2 Penetration Testing Phases
19.4.2.1 Planning Process
19.4.2.2 Discovery Phase
19.4.2.3 Attack Phase
19.4.2.4 Reporting Phase
19.5 Vulnerabilities in Chatbot
19.6 Conclusion
References
20. ChatBot-Based Next-Generation Intrusion Detection System
Tzu-Chia Chen
20.1 Introduction
20.2 Literature Survey
20.2.1 Review of Optimization Algorithms for IDS
20.2.2 Review of Classification Methods for IDS
20.3 Methodology
20.4 Result Analysis
20.5 Conclusion
References
21. Conversational Chatbot With Object Recognition Using Deep Learning and Machine Learning
A. Mahesh Babu, Malik Jawarneh, José Luis Arias-Gonzáles, Meenakshi, Kishori Kasat and K.P. Yuvaraj
21.1 Introduction
21.2 Literature Survey
21.2.1 Object Recognition Using Deep Learning
21.2.2 Object Recognition in Real-Time Images
21.3 Methodology
21.4 Results and Discussion
21.5 Conclusion
References
22. Automatic Speech Recognition Design Modeling
Babu Rao.K, Bhargavi Mopuru, Malik Jawarneh, José Luis Arias-Gonzáles, Samuel-Soma M. Ajibade and P. Prabhu
22.1 Introduction
22.2 Literature Survey
22.2.1 Noise Reduction Algorithms for Speech Enhancement
22.2.2 Speech Segmentation, Feature Extraction
22.3 Methodology
22.4 Experimental Result Analysis
22.5 Conclusion
References
23. The Future of Modern Transportation for Smart Cities Using Trackless
Tram Networks

Samson Arun Raj A. and Yogesh P.
23.1 Introduction
23.2 Proposed System Architecture
23.3 Working Process of the TRAM-RSU Framework
23.4 Experimental Analysis
23.5 Summary
References
24. Evaluating the Performance of Conversational AI Tools: A Comparative Analysis
Deepika Chauhan, Chaitanya Singh, Romil Rawat and Manoj Dhawan
24.1 Introduction
24.2 Literature Review
24.3 Methodology
24.3.1 Methodology Phases
24.3.1.1 Define the Evaluation Metrics
24.3.1.2 Prepare the Test Data and Scenarios
24.3.1.3 Select the Evaluation Methodology
24.3.1.4 Conduct the Evaluation
24.3.1.5 Analyze and Interpret the Results
24.3.1.6 Draw Conclusions and Make Recommendations
24.3.2 Types of Evaluation Metrics Used for the Evaluation
24.3.2.1 Evaluation Metrics
24.3.2.2 Dialog Generation
24.3.2.3 User Experience
24.4 Result
24.4.1 Platforms Used for the Implementation of Conversational AI Tools
24.4.1.1 Amazon Lex
24.4.1.2 Google Dialog Flow
24.4.1.3 Microsoft’s Bot Framework
24.4.1.4 Wit.ai
24.4.1.5 Dialog Flow
24.4.1.6 LUIS
24.4.1.7 Watson Conversation
24.4.1.8 Rasa
24.4.1.9 Century Tech
24.4.2 Conversational AI Tools Used in Research
24.4.2.1 Data Collection
24.4.2.2 Data Analysis
24.4.2.3 Data Interpretation
24.4.2.4 Human–AI Interaction
24.4.2.5 Ethical Considerations
24.4.3 Smart Tutoring Systems
24.4.3.1 Carnegie Learning
24.4.3.2 DreamBox Learning
24.4.3.3 Squirrel AI
24.4.3.4 Knewton
24.4.3.5 Duolingo
24.4.3.6 Coursera
24.4.4 Smart Invigilation
24.4.4.1 Proctorio
24.4.4.2 ExamSof
24.4.4.3 Respondus Monitor
24.4.4.4 Honorlock
24.4.4.5 ProctorU
24.4.4.6 Kryterion Webassessor
24.4.4.7 Secure Exam Remote Proctor
24.4.4.8 Bvirtual
24.4.4.9 PSI Bridge
24.4.4.10 Talview
24.4.5 Conversational AI Tools Used for Autonomous Grading Systems
24.4.5.1 Gradescope
24.4.5.2 Turnitin
24.4.5.3 Coursera Auto-Grader
24.4.5.4 Code Runner
24.4.5.5 EdX
24.4.5.6 AI-Assisted Grading
24.4.5.7 Light SIDE
24.4.5.8 Xceptiona lED
24.4.5.9 Vantage Learning’s MY Access
24.4.5.10 Gradescope for Programming
24.4.5.11 Grammarly
24.4.5.12 Pearson
24.4.6 Conversational AI-Based Monitoring System Tools
24.4.6.1 IBM Watson
24.4.6.2 Verint
24.4.6.3 Darktrace
24.4.6.4 Cybereason
24.4.6.5 Splunk
24.4.6.6 Microsoft Azure Monitor
24.4.6.7 OpsGenie
24.4.6.8 Botmetric
24.4.6.9 DataDog
24.4.6.10 IBM Watson Assistant
24.4.6.11 Hugging Face
24.4.6.12 Zabbix
24.5 Discussion
24.6 Conclusion
References
25. Conversational AI Applications in Ed-Tech Industry: An Analysis of Its Impact and Potential in Education
Deepika Chauhan, Chaitanya Singh, Romil Rawat and Mukesh Chouhan
25.1 Introduction
25.2 Conversational AI in Ed-Tech Overview
25.3 Methodology
25.3.1 Planning
25.3.1.1 Inclusion and Exclusion Criteria
25.3.1.2 Source of Information
25.3.1.3 Search Procedure
25.3.2 Conducting the Review
25.3.2.1 Search String
25.3.2.2 Data Extraction
25.3.2.3 Quality Evaluation
25.3.3 Research Question Formulation
25.3.4 Review Reporting
25.3.4.1 RQ1. What are the Different Streams in the Ed-Tech Industry Where Conversational AI Applications are Used?
25.3.4.2 RQ2. What are the Different Platforms Used in the Ed-Tech Industry to Operate Conversational AI Applications?
25.3.4.3 RQ3. What are the Different Roles Played by Conversational AI Applications in the Ed-Tech Industry?
25.3.4.4 RQ2. What are the Primary Benefits of the Conversational AI Applications in Ed-Tech Industry?
25.3.4.5 What are the Challenges Faced in the Implementation of Conversational AI Applications in the Ed-Tech Industry that Literature Reviewed?
25.3.4.6 RQ3. What are the Potential Future Areas of the Ed-Tech Industry that Could be Benefited via the Applications of Conversational AI Applications?
25.4 Conclusion, Limitation, and Future Work
References
26. Conversational AI: Introduction to Chatbot’s Security Risks, Their Probable Solutions, and the Best Practices to Follow
Vivek Bhardwaj, Balwinder Kaur Dhaliwal, Sanjaya Kumar Sarangi, T.M. Thiyagu, Aruna Patidar and Divyam Pithawa
26.1 Introduction
26.2 Related Work
26.3 History and Evolution of Chatbots
26.4 Components & Concepts that Make Conversational AI Possible
26.5 Working of Conversational AI
26.6 Reasons Behind why Companies are Using Chatbot
26.7 Plans for the Future Development of Conversational AI
26.8 Security Risks of Conversational AI’s Chatbot
26.9 Probable Solutions to the Security Vulnerabilities
26.10 Privacy Laws for the Security of Conversational AI and Chatbot
26.11 Chatbot and GDPR
26.12 Best Practices to Follow to Ensure Chatbot Security
26.13 Conclusion
Acknowledgment
References
27. Recent Trends in Pattern Recognition, Challenges and Opportunities
S. Kannadhasan and R. Nagarajan
27.1 Introduction
27.2 Optical Character Recognition
27.3 Various Sectors of Pattern Recognition
27.4 Applications of Natural Language Processing
27.5 Conclusion
References
28. A Review of Renewable Energy Efficiency Technologies Toward Conversational AI
S. Kannadhasan and R. Nagarajan
28.1 Introduction
28.2 Renewable Energy
28.3 Energy Technologies
28.4 Conversational AI
28.5 Conclusion
References
29. Messaging Apps Vulnerability Assessment Using Conversational AI
Tzu-Chia Chen
29.1 Introduction
29.1.1 Nature of Information Security
29.1.2 Information Security Assessment
29.1.2.1 Testing
29.1.2.2 Checking
29.1.2.3 Interview
29.1.3 Information Security Assessment Methodology
29.1.4 Information Security and Penetration Testing
29.2 Penetration Test
29.2.1 Difference between a Penetration Tester and an Attacker
29.2.2 Objectives of Penetration Test
29.2.3 Penetration Testing Phases
29.2.3.1 Planning Process
29.2.3.2 Discovery Phase
29.2.3.3 Attack Phase
29.2.3.4 Reporting Phase
29.3 Mobile App Security
29.3.1 Types of Attacks
29.4 Discovered Vulnerabilities in Mobile Applications
29.5 Mitigation Strategies Against Cross-Site Scripting and SQL Attacks
29.5.1 Cross-Site Scripting Mitigation Strategies
29.5.2 SQL Injection Attack Mitigation Strategies
29.6 Mobile Application Security Framework
29.7 Conclusion
References
30. Conversational AI Threat Identification at Industrial Internet of Things
Boussaadi Smail, Meenakshi, José Luis Arias-Gonzáles, Malik Jawarneh, P. Venkata Hari Prasad and Harikumar Pallathadka
30.1 Introduction
30.2 IoT Layered Architecture
30.3 Security Issues in IoT
30.4 Literature Survey of Various Attacks on Industrial Internet of Things
30.5 Various Attacks in Industrial Internet of Things
30.5.1 Perception Layer Attacks
30.5.2 Network Layer Attacks
30.5.3 Application Layer Attacks
30.6 Recent Attacks on Industrial IoT
30.7 Conclusion
References
31. Conversational AI—A State-of-the-Art Review
Vivek Bhardwaj, Mukesh Kumar, Divyani Joshi, Ankita Chourasia, Bhushan Bawaskar and Shashank Sharma
31.1 Introduction
31.1.1 History of Conversational AI
31.1.2 Evolution of Conversational AI
31.2 Related Work
31.3 Problem Statement
31.4 Proposed Methodology
31.5 Regulatory Landscape of Conversational AI
31.6 Future Works
31.7 Conclusion
References
32. Risks for Conversational AI Security
Vivek Bhardwaj, Safdar Sardar Khan, Gurpreet Singh, Sunil Patil, Devendra Kuril and Sarthak Nahar
32.1 Introduction
32.2 Related Work
32.3 History and Evolution of Conversational AI Security
32.4 Components and Concepts that Make Coversational AI Security
32.4.1 Authentication and Authorization
32.4.1.1 Authentication and Authorization Working Together
32.4.1.2 Benefits of Authentication and Authorization
32.4.2 Encryption
32.4.3 Privacy
32.4.4 Trust
32.4.5 Threat Detection and Response
32.4.6 Compliance
32.4.7 Testing and Auditing
32.4.8 Continuous Improvement
32.5 Working of Conversational AI Security
32.5.1 Threat Modeling
32.5.2 Data Encryption
32.5.3 Secure Communication
32.5.4 Bot Detection
32.5.5 Continuous Monitoring
32.5.6 Regular Updates and Patching
32.6 Risk for Conversational AI Security
32.6.1 Data Privacy
32.6.2 Malicious Attacks
32.6.3 Misuse of User Data
32.6.4 Social Engineering
32.7 Solutions for Conversational AI Security
32.7.1 Encryption and Access Control
32.7.2 Regular Security Audits
32.7.3 Transparent Data Collection Practices
32.7.4 Suspicious Behavior Detection
32.8 Conclusion
Acknowledgement
References
33. Artificial Intelligence for Financial Inclusion in India
Samir Xavier Bhawnra and K.B. Singh
33.1 Introduction
33.1.1 Financial Inclusion in India
33.1.2 Growth of Financial Inclusion in India
33.1.3 Direct Benefit Transfer
33.2 Digitalization of Banking Sector Paving Way for AI in Financial Inclusion
33.2.1 Digital Financial Inclusion Journey
33.2.2 Importance of Aadhaar for Digital Banking
33.2.3 Unified Payments Interface (UPI)
33.2.4 RuPay
33.3 Technology Acceptance Model
33.4 AI and Use of AI in Financial Inclusion
33.4.1 Advent of AI Banking in India
33.4.2 Artificial Intelligence (AI)
33.4.3 Function of AI in Banking Sector
33.4.4 The Main Purpose of Using AI in Banking
33.4.5 Adoption of AI for Financial Inclusion
33.4.6 Use of AI for Financial Inclusion
33.4.7 Financial Inclusion With the Help of e-KYC
33.5 Conclusion
References
34. Revolutionizing Government Operations: The Impact of Artificial Intelligence in Public Administration
Aman Kumar Mishra, Amit Kumar Tyagi, Sathian Dananjayan, Anand Rajavat, Hitesh Rawat and Anjali Rawat
34.1 Introduction
34.2 Methodology
34.3 The Origin and Development of AI Technology and Current Methodologies in the Field
34.4 Artificial Intelligence in Indian Governance
34.4.1 Law Enforcement
34.4.1.1 Facial and Speech Recognition
34.4.1.2 Predictive Analytics
34.4.1.3 Robo-Cops
34.4.2 Education
34.4.2.1 Decision Making
34.4.2.2 Personalized Learning
34.4.2.3 Student Services
34.4.2.4 Student Progress Monitoring
34.4.3 Defense
34.4.3.1 Intelligence, Surveillance, and Reconnaissance
34.4.3.2 Robot Soldiers
34.4.3.3 Cyber Defense
34.4.3.4 Intelligent Weapon Systems
34.5 Discharge of Government Functions
34.5.1 Citizen/Government Interface/E-Governance
34.5.1.1 Agriculture
34.5.1.2 Categorization and Arrangement of Documents
34.6 Challenges
34.6.1 Improved Capacity And Enhanced Understanding of Emerging Technologies
34.6.2 Infrastructure
34.6.3 Trust
34.6.4 Funding
34.6.5 Privacy and Security
34.6.6 Transparency
34.7 Conclusion
References
Bibliography
35. Conversational AI and Cloud Platform: An Investigation of Security and Privacy
V. Durga Prasad Jasti, Devabalan Pounraj, Malik Jawarneh, Meenakshi, P. Venkata Hari Prasad and Samrat Ray
35.1 Introduction
35.2 Cloud Architecture
35.2.1 Cloud Components
35.2.1.1 Clients
35.2.1.2 Datacenter
35.2.1.3 Distributed Servers
35.2.2 Cloud Deployment Models
35.2.2.1 Public Cloud
35.2.2.2 Private Cloud
35.2.2.3 Community Cloud
35.2.2.4 Hybrid Cloud
35.2.3 The Cloud Computing Stack as Cloud Services
33.2.3.1 Software as a Service (SaaS)
35.2.3.2 Platform as a Service (PaaS)
33.2.3.3 Infrastructure as a Service (IaaS)
35.3 Literature Survey
35.4 Security in Conversational AI and Cloud Computing
35.4.1 Importance of Security in Cloud Computing
35.4.2 Security Principles
35.4.3 Cloud Computing and Conversational AI Security Issues
35.4.4 Security Attacks in Chatbot and Cloud Platform
35.5 Conclusion
References
36. Chatbot vs Intelligent Virtual Assistance (IVA)
Ajit Noonia, Rijvan Beg, Aruna Patidar, Bhushan Bawaskar, Shashank Sharma and Hitesh Rawat
36.1 Introduction
36.2 Related Work
36.3 Problem Statement
36.4 Proposed Methodology
36.5 Regulatory Landscape
36.6 Future Works
36.7 Conclusion
References
37. Digital Forensics with Emerging Technologies: Vision and Research Potential for Future
Anand Kumar Mishra, V. Hemamalini and Amit Kumar Tyagi
37.1 Introduction
37.2 Background Work
37.3 Digital Twin Technology—An Era of Emerging Technology
37.4 Security
37.4.1 Types of Security
37.5 Digital Forensics Characteristics
37.6 Computer Forensics
37.7 Tool Required for Digital Forensics
37.8 Importance of Computer and Digital Forensics in Smart Era
37.9 Methods/Algorithms for Digital Forensics in Smart Era
37.10 Popular Tools Available for Digital Forensics
37.11 Popular Issues Towards Using AI–Blockchain–IoT in Digital Forensics
37.12 Future Research Opportunities Using AI-Blockchain-IoT in Digital Forensics
37.12.1 Other Future Works
37.12.2 Future of Blockchain
37.12.3 Future of Artificial Intelligence
37.12.4 Future of Internet of Things
37.12.5 Future of AI/ML–Blockchain–IoT Based Smart Devices in Digital Forensics
37.13 Limitations AI/ML–Blockchain–IoT-Based Smart Devices in Digital Forensics
37.14 Conclusion
References
38. Leveraging Natural Language Processing in Conversational AI Agents to Improve Healthcare Security
Jami Venkata Suman, Farooq Sunar Mahammad, M. Sunil Kumar, B. Sai Chandana and Sankararao Majji
38.1 Introduction
38.2 Natural Language Process in Healthcare
38.3 Role of Conversational AI in Healthcare
38.4 NLP-Driven Security Measures
38.5 Integrating NLP With Security Framework
38.6 Conclusion
References
39. NLP-Driven Chatbots: Applications and Implications in Conversational AI
A. Mary Sowjanya and Kotagiri Srividya
39.1 Introduction
39.2 Related Work
39.3 NLP-Driven Chatbot Technologies
39.4 Chatbot Software for Automated Systems
39.5 Conclusion
References
About the Editors
Index


Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page