Papers by Glorin Sebastian

Persuading Patients using Rhetoric to Improve Artificial Intelligence Adoption: Experimental Study (Preprint)
Journal of Medical Internet Research, Mar 13, 2023
Background Artificial intelligence (AI) can transform health care processes with its increasing a... more Background Artificial intelligence (AI) can transform health care processes with its increasing ability to translate complex structured and unstructured data into actionable clinical decisions. Although it has been established that AI is much more efficient than a clinician, the adoption rate has been slower in health care. Prior studies have pointed out that the lack of trust in AI, privacy concerns, degrees of customer innovativeness, and perceived novelty value influence AI adoption. With the promotion of AI products to patients, the role of rhetoric in influencing these factors has received scant attention. Objective The main objective of this study was to examine whether communication strategies (ethos, pathos, and logos) are more successful in overcoming factors that hinder AI product adoption among patients. Methods We conducted experiments in which we manipulated the communication strategy (ethos, pathos, and logos) in promotional ads for an AI product. We collected responses from 150 participants using Amazon Mechanical Turk. Participants were randomly exposed to a specific rhetoric-based advertisement during the experiments. Results Our results indicate that using communication strategies to promote an AI product affects users’ trust, customer innovativeness, and perceived novelty value, leading to improved product adoption. Pathos-laden promotions improve AI product adoption by nudging users’ trust (n=52; β=.532; P<.001) and perceived novelty value of the product (n=52; β=.517; P=.001). Similarly, ethos-laden promotions improve AI product adoption by nudging customer innovativeness (n=50; β=.465; P<.001). In addition, logos-laden promotions improve AI product adoption by alleviating trust issues (n=48; β=.657; P<.001). Conclusions Promoting AI products to patients using rhetoric-based advertisements can help overcome factors that hinder AI adoption by assuaging user concerns about using a new AI agent in their care process.

International journal of mechanical and production engineering research and development, 2020
The evolution of Controls team from being responsible only for Compliance to being responsible fo... more The evolution of Controls team from being responsible only for Compliance to being responsible for the entire Project Risk and Controls during an ERP implementation is testimony to the realization by Business on the value that the Controls team brings in. It is also indicative of the rise to prominence of this team among the various component implementation teams from a mere check the box item or an afterthought to an integral part of the entire ERP implementation cycle, right from requirements elicitation through development, testing, go-live and production support. There are four key reasons why risk and controls team is indispensable in an ERP implementation. Risk and controls team in each stage of ERP implementation lifecycle namely, project planning, requirements, testing and postproduction support. An incorrect implementation could affect the daily business operations severely and could seriously jeopardize the future of the company. Hence any project that involves IT and Business transformation is to be approached with meticulous planning and preparation to ensure successful transformation aligns to the business objectives.

International journal of security and privacy in pervasive computing, Mar 22, 2023
The rise of artificial intelligence (AI) has opened up new frontiers in various fields, including... more The rise of artificial intelligence (AI) has opened up new frontiers in various fields, including natural language processing. One of the most significant advancements in this area is the development of conversational agents (i.e., chatbots), which are computer programs designed to interact with humans through messaging interfaces. The emergence of large language models, such as ChatGPT, has enabled the creation of highly sophisticated chatbots that can mimic human conversations with impressive accuracy. However, the use of these chatbots also poses significant cyber risks that must be addressed. This research paper seeks to investigate the cyber risks associated with the use of ChatGPT and other similar AI-based chatbots, including potential vulnerabilities that could be exploited by malicious actors. As part of this research, a survey was conducted to explore the cybersecurity risks associated with AI-based chatbots like ChatGPT. Further, the paper also suggests mitigation methods that can be used to mitigate these cyber risks and vulnerabilities.

International journal of security and privacy in pervasive computing, Sep 16, 2022
Metaverse, also known as the successor of mobile internet, has become immensely popular given the... more Metaverse, also known as the successor of mobile internet, has become immensely popular given the increased focus of technology companies on Web 3.0 and virtual reality. Though its popularity has grown at least within the tech industry, there has not been a survey conducted to measure the awareness and perception of metaverse among regular technology users. Further, there have been studies conducted to apply the technology acceptance model to metaverse users. However, such studies have not been conducted from a cybersecurity risk perspective. This study fills this gap by understanding the awareness, perception, and concerns about metaverse adoption. Further, based on the technology acceptance model, the authors propose techniques that could improve perception and reduce concerns about this technology, enabling faster acceptance and use.
Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study
International cybersecurity law review, Sep 7, 2022

International journal of security and privacy in pervasive computing, Dec 16, 2022
Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environ... more Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets-a world known as the Metaverse-this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.
Communications of the IBIMA, Feb 17, 2021
Organizations struggle to strike the right balance between flexibility and security for remote wo... more Organizations struggle to strike the right balance between flexibility and security for remote work. With the major portion of the workforce in every country working from home during the covid-19 pandemic, employers might not have accounted for this scale of load on their IT infrastructure, not to mention their cybersecurity preparedness. Cybercriminals have been working to exploit this unpreparedness with regards to IT Infrastructure. The purpose of this study is to discuss increased cybersecurity risks of work from home due to Covid-19 pandemic, and as part of the study, a WFH cyber-attack mitigation framework has been proposed with eight simple but effective steps to mitigate and prevent these cyber-attacks.

International Journal of Security and Privacy in Pervasive Computing
The evolution of artificial intelligence (AI) and machine learning (ML) has led to the developmen... more The evolution of artificial intelligence (AI) and machine learning (ML) has led to the development of sophisticated large language models (LLMs) that are used extensively in applications such as chatbots. This research investigates the critical issues of data protection and privacy enhancement in the context of LLM-based chatbots, with a focus on OpenAI's ChatGPT. It explores the dual challenges of safeguarding sensitive user information while ensuring the efficiency of machine learning models. It assesses existing privacy-enhancing technologies (PETs) and proposes innovative methods, such as differential privacy, federated learning, and data minimization techniques. The study also includes a survey of Chatbot users to measure their concerns related to data privacy with the use of these LLM-based applications. This study is meant to serve as a comprehensive guide for developers, policymakers, and researchers, contributing to the discourse on data protection in artificial intelli...
Hello! This is your new HR Assistant, ChatGPT! Impact of AI Chatbots on Human Resources: A Transformative Analysis
SSRN Electronic Journal
Exploring Ethical Implications of ChatGPT and Other AI Chatbots and Regulation of Disinformation Propagation
SSRN Electronic Journal
Privacy and Data Protection in ChatGPT and Other AI Chatbots: Strategies for Securing User Information
SSRN Electronic Journal

Cyber Kill Chain Analysis of Five Major US Data Breaches
International Journal of Cyber Warfare and Terrorism
Data breaches are a major concern for both US and global corporations. With more companies allowi... more Data breaches are a major concern for both US and global corporations. With more companies allowing their employees to be working remote, providing them a secure work environment has been a priority for employers. The Interpol 2020 report on cyber breaches mentions that the number of cyber-attacks has multiplied in the last year. The IBM Data Breach Report of 2021 notes that data breach costs rose from USD 3.86 million to USD 4.24 million, while the average cost was USD 1.07 Mil higher in breaches where remote work was a factor in causing the breach. Given this environment of increased cyber breaches, it is important to learn from previous major data breaches to understand the root cause which led to the compromise of information security and the steps which could have effectively prevented the same. This paper evaluates five major data breaches in US history using Lockheed's Cyber Kill Chain Analysis, since the details of these breaches have never been documented for research a...

Persuading Patients Using Rhetoric to Improve Artificial Intelligence Adoption: Experimental Study
Journal of Medical Internet Research
Background Artificial intelligence (AI) can transform health care processes with its increasing a... more Background Artificial intelligence (AI) can transform health care processes with its increasing ability to translate complex structured and unstructured data into actionable clinical decisions. Although it has been established that AI is much more efficient than a clinician, the adoption rate has been slower in health care. Prior studies have pointed out that the lack of trust in AI, privacy concerns, degrees of customer innovativeness, and perceived novelty value influence AI adoption. With the promotion of AI products to patients, the role of rhetoric in influencing these factors has received scant attention. Objective The main objective of this study was to examine whether communication strategies (ethos, pathos, and logos) are more successful in overcoming factors that hinder AI product adoption among patients. Methods We conducted experiments in which we manipulated the communication strategy (ethos, pathos, and logos) in promotional ads for an AI product. We collected response...
Do ChatGPT and Other AI Chatbots Pose a Cybersecurity Risk? - An Exploratory Study
SSRN Electronic Journal

International Journal of Security and Privacy in Pervasive Computing
The rise of artificial intelligence (AI) has opened up new frontiers in various fields, including... more The rise of artificial intelligence (AI) has opened up new frontiers in various fields, including natural language processing. One of the most significant advancements in this area is the development of conversational agents (i.e., chatbots), which are computer programs designed to interact with humans through messaging interfaces. The emergence of large language models, such as ChatGPT, has enabled the creation of highly sophisticated chatbots that can mimic human conversations with impressive accuracy. However, the use of these chatbots also poses significant cyber risks that must be addressed. This research paper seeks to investigate the cyber risks associated with the use of ChatGPT and other similar AI-based chatbots, including potential vulnerabilities that could be exploited by malicious actors. As part of this research, a survey was conducted to explore the cybersecurity risks associated with AI-based chatbots like ChatGPT. Further, the paper also suggests mitigation methods...

International Journal of Security and Privacy in Pervasive Computing
Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environ... more Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.
Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study
International Cybersecurity Law Review
Communications of the IBIMA, 2021
Organizations struggle to strike the right balance between flexibility and security for remote wo... more Organizations struggle to strike the right balance between flexibility and security for remote work. With the major portion of the workforce in every country working from home during the covid-19 pandemic, employers might not have accounted for this scale of load on their IT infrastructure, not to mention their cybersecurity preparedness.

A Study on Metaverse Awareness, Cyber Risks, and Steps for Increased Adoption
International Journal of Security and Privacy in Pervasive Computing
Metaverse, also known as the successor of mobile internet, has become immensely popular given the... more Metaverse, also known as the successor of mobile internet, has become immensely popular given the increased focus of technology companies on Web 3.0 and virtual reality. Though its popularity has grown at least within the tech industry, there has not been a survey conducted to measure the awareness and perception of metaverse among regular technology users. Further, there have been studies conducted to apply the technology acceptance model to metaverse users. However, such studies have not been conducted from a cybersecurity risk perspective. This study fills this gap by understanding the awareness, perception, and concerns about metaverse adoption. Further, based on the technology acceptance model, the authors propose techniques that could improve perception and reduce concerns about this technology, enabling faster acceptance and use.
A descriptive study on cybersecurity challenges of working from home during COVID-19 pandemic and proposed 8 step WFH cyber-attack mitigation plan
Uploads
Papers by Glorin Sebastian