首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
Visualization of Container Movements through a Web-Based Geographical Information System 通过基于web的地理信息系统实现集装箱运动的可视化
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.40
T. Dimitrova, A. Tsois, E. Camossi
The paper describes an advanced prototype of a web-based geographical information system enabling interactive visualization of container movements. It implements multiple data selection mechanisms and presentation methods, one of which is the geographical visualization on a map of the locations where the container events occurred. Key features of the system include the visualization on the map of critical aspects of the data and the semantic summarization of the records while allowing the user to drill-down to all the details available. Risk analysts dealing with the container traffic can use the system through a regular web browser and easily find and understand the information they are looking for. Such a system is expected to allow them to make better and faster decisions.
本文描述了一个基于网络的地理信息系统的先进原型,使集装箱运动的交互式可视化。它实现了多种数据选择机制和表示方法,其中之一是在容器事件发生地点的地图上实现地理可视化。该系统的主要功能包括在地图上可视化数据的关键方面和记录的语义摘要,同时允许用户深入到所有可用的细节。处理集装箱流量的风险分析人员可以通过常规的web浏览器使用该系统,轻松地查找和理解他们正在寻找的信息。这样的系统有望使他们做出更好、更快的决定。
{"title":"Visualization of Container Movements through a Web-Based Geographical Information System","authors":"T. Dimitrova, A. Tsois, E. Camossi","doi":"10.1109/EISIC.2013.40","DOIUrl":"https://doi.org/10.1109/EISIC.2013.40","url":null,"abstract":"The paper describes an advanced prototype of a web-based geographical information system enabling interactive visualization of container movements. It implements multiple data selection mechanisms and presentation methods, one of which is the geographical visualization on a map of the locations where the container events occurred. Key features of the system include the visualization on the map of critical aspects of the data and the semantic summarization of the records while allowing the user to drill-down to all the details available. Risk analysts dealing with the container traffic can use the system through a regular web browser and easily find and understand the information they are looking for. Such a system is expected to allow them to make better and faster decisions.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Tool for Visualizing and Analyzing Users on Discussion Boards 一个可视化和分析讨论版用户的工具
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.60
A. Shrestha
Summary form only given. Analyzing discussion boards is becoming an important task for intelligence analysts all over the world. One important aspect when analyzing discussion boards is to identify users that make use of multiple aliases. We have implementation a prototype that can be used to check different equality measures among users on a discussion boards. To test the prototype we use the ICWSM data set boards.ie.
只提供摘要形式。分析讨论板已成为世界各国情报分析人员的一项重要任务。分析讨论板时的一个重要方面是识别使用多个别名的用户。我们已经实现了一个原型,可以用来检查讨论板上用户之间的不同平等措施。为了测试原型,我们使用了ICWSM数据集板。
{"title":"A Tool for Visualizing and Analyzing Users on Discussion Boards","authors":"A. Shrestha","doi":"10.1109/EISIC.2013.60","DOIUrl":"https://doi.org/10.1109/EISIC.2013.60","url":null,"abstract":"Summary form only given. Analyzing discussion boards is becoming an important task for intelligence analysts all over the world. One important aspect when analyzing discussion boards is to identify users that make use of multiple aliases. We have implementation a prototype that can be used to check different equality measures among users on a discussion boards. To test the prototype we use the ICWSM data set boards.ie.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"795 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusting Open Source Information 信任开源信息
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.77
Marianela García Lozano
Intelligence analysis is dependent on credible input data that comes from trusted and reliable sources. Open Source Information (OSINF) provides an abundance of data, but it comes with the price of noise, i.e., a lot of the data is irrelevant, ambiguous, contradicting, biased or plain wrong. Despite this, making full use of the wealth of data that OSINF encompasses would improve the quality of intelligence analysis.
情报分析依赖于来自可信和可靠来源的可信输入数据。开源信息(OSINF)提供了大量的数据,但它也带来了噪音的代价,即,许多数据是不相关的、模棱两可的、相互矛盾的、有偏见的或明显错误的。尽管如此,充分利用osinff所包含的丰富数据将提高情报分析的质量。
{"title":"Trusting Open Source Information","authors":"Marianela García Lozano","doi":"10.1109/EISIC.2013.77","DOIUrl":"https://doi.org/10.1109/EISIC.2013.77","url":null,"abstract":"Intelligence analysis is dependent on credible input data that comes from trusted and reliable sources. Open Source Information (OSINF) provides an abundance of data, but it comes with the price of noise, i.e., a lot of the data is irrelevant, ambiguous, contradicting, biased or plain wrong. Despite this, making full use of the wealth of data that OSINF encompasses would improve the quality of intelligence analysis.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Redundant Tracking System for Emergency Response 一种新的应急响应冗余跟踪系统
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.50
J. Rajamäki, Paresh Rathod, Pasi Kamppi
Geographic information systems (GIS) and global navigation satellite systems (GNSS) have transformed emergencies and disasters response across the world. These technologies are enabling emergency management agencies to carry out their duty efficiently. However, current GNSS-based tracking systems have serious technical flaws and vulnerabilities. This paper presents a modular system-level description for a hybrid tracking system. The paper further discusses and suggests how the technical vulnerabilities of GNSS-based tracking systems can be resolve.
地理信息系统(GIS)和全球卫星导航系统(GNSS)已经改变了世界各地的突发事件和灾害响应。这些技术使应急管理机构能够有效地履行其职责。然而,目前基于gnss的跟踪系统存在严重的技术缺陷和漏洞。本文提出了混合跟踪系统的模块化系统级描述。本文进一步讨论并建议如何解决基于gnss的跟踪系统的技术漏洞。
{"title":"A New Redundant Tracking System for Emergency Response","authors":"J. Rajamäki, Paresh Rathod, Pasi Kamppi","doi":"10.1109/EISIC.2013.50","DOIUrl":"https://doi.org/10.1109/EISIC.2013.50","url":null,"abstract":"Geographic information systems (GIS) and global navigation satellite systems (GNSS) have transformed emergencies and disasters response across the world. These technologies are enabling emergency management agencies to carry out their duty efficiently. However, current GNSS-based tracking systems have serious technical flaws and vulnerabilities. This paper presents a modular system-level description for a hybrid tracking system. The paper further discusses and suggests how the technical vulnerabilities of GNSS-based tracking systems can be resolve.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125744625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces 机敏:通过主动决策支持和自适应以地图为中心的用户界面增强态势感知
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.74
Bart Adams, Frank Suykens
The Astute project is an ongoing European Artemis project that researches methods to improve the effectiveness of embedded and mobile systems. It does so by providing human-machine interfaces (HMIs) that automatically and proactively adapt, based on the sensed environment and user state. One of the implemented demonstrators supports emergency workers during field operations using on-sleeve and tablet-sized mobile devices. Extensive field and usability studies have proved that a geospatial, map-centric user interface (UI)is essential to provide a low-barrier interface that is easy to learn. The integration of context and user-state reasoning enables proactive decision support that makes HMIs smarter and more effective in stressful and critical situations. We argue that the promising results obtained for the emergency domain have great potential to improve the current practice in border control use cases as well.
精明项目是一个正在进行的欧洲阿尔忒弥斯项目,研究方法,以提高嵌入式和移动系统的有效性。它通过提供基于感知环境和用户状态自动主动适应的人机界面(hmi)来实现这一点。其中一个已实施的示范设备使用套上式和平板电脑大小的移动设备,在现场作业期间为应急工作人员提供支持。广泛的领域和可用性研究已经证明,地理空间、以地图为中心的用户界面(UI)对于提供易于学习的低障碍界面至关重要。上下文和用户状态推理的集成实现了主动决策支持,使hmi在压力和危急情况下更智能、更有效。我们认为,在紧急领域获得的有希望的结果也有很大的潜力来改进边境控制用例中的当前实践。
{"title":"Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces","authors":"Bart Adams, Frank Suykens","doi":"10.1109/EISIC.2013.74","DOIUrl":"https://doi.org/10.1109/EISIC.2013.74","url":null,"abstract":"The Astute project is an ongoing European Artemis project that researches methods to improve the effectiveness of embedded and mobile systems. It does so by providing human-machine interfaces (HMIs) that automatically and proactively adapt, based on the sensed environment and user state. One of the implemented demonstrators supports emergency workers during field operations using on-sleeve and tablet-sized mobile devices. Extensive field and usability studies have proved that a geospatial, map-centric user interface (UI)is essential to provide a low-barrier interface that is easy to learn. The integration of context and user-state reasoning enables proactive decision support that makes HMIs smarter and more effective in stressful and critical situations. We argue that the promising results obtained for the emergency domain have great potential to improve the current practice in border control use cases as well.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127959939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems 信息融合技术能力在现代情报和安全问题中的挑战
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.20
J. Llinas
Evolutions in both the socio-political dynamics of the World and in Information and Computing Technologies have drastically changed the nature of many intelligence problems in ways that make them much more complex. Information Fusion (IF) technologies, which have historically been among the leading suppliers of information to intelligence analyses and analysts, are now similarly challenged to address these new complexities. This paper offers perspectives on what these challenges entail, and briefly describes some research efforts attempting to deal with some of these challenges. However, there is much more that needs to be done by the IF community, and some of the needed research and development is also described in the paper.
世界的社会政治动态以及信息和计算技术的发展已经极大地改变了许多智能问题的本质,使它们变得更加复杂。信息融合(IF)技术,历史上一直是情报分析和分析人员的主要信息供应商之一,现在同样面临着解决这些新的复杂性的挑战。本文提供了这些挑战带来的观点,并简要描述了一些试图应对这些挑战的研究工作。然而,IF社区需要做的还有很多,论文中也描述了一些必要的研究和开发。
{"title":"Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems","authors":"J. Llinas","doi":"10.1109/EISIC.2013.20","DOIUrl":"https://doi.org/10.1109/EISIC.2013.20","url":null,"abstract":"Evolutions in both the socio-political dynamics of the World and in Information and Computing Technologies have drastically changed the nature of many intelligence problems in ways that make them much more complex. Information Fusion (IF) technologies, which have historically been among the leading suppliers of information to intelligence analyses and analysts, are now similarly challenged to address these new complexities. This paper offers perspectives on what these challenges entail, and briefly describes some research efforts attempting to deal with some of these challenges. However, there is much more that needs to be done by the IF community, and some of the needed research and development is also described in the paper.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Radiated Emission from Handheld Devices with Touch-Screen LCDs 带有触摸屏lcd的手持设备的辐射发射
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.51
Kamaruddin Abdul Ghani, K. Dimyati, Khadijah Ismail, L. S. Supian
Handheld communication devices fitted with touch-screen LCDs do emit some kind of electromagnetic radiation (EMR) even though they were not designed to do so. There is potential for the emission can be intercepted and reconstructed for eavesdropping or even intelligence purposes. Information leakage from hand-held devices can be valuable information for the intelligence communities. This paper presented discussions on how much unintentional emission is radiated from these devices. Comparison on the level of emission is made based on manufacturers and sizes of LCD.
装有触摸屏lcd的手持通信设备确实会发出某种电磁辐射(EMR),尽管它们的设计初衷并非如此。这种发射有可能被拦截和重建,用于窃听甚至情报目的。从手持设备泄露的信息对情报部门来说可能是有价值的信息。本文对这些装置的非故意辐射量进行了讨论。根据液晶显示器的生产厂家和尺寸对辐射水平进行了比较。
{"title":"Radiated Emission from Handheld Devices with Touch-Screen LCDs","authors":"Kamaruddin Abdul Ghani, K. Dimyati, Khadijah Ismail, L. S. Supian","doi":"10.1109/EISIC.2013.51","DOIUrl":"https://doi.org/10.1109/EISIC.2013.51","url":null,"abstract":"Handheld communication devices fitted with touch-screen LCDs do emit some kind of electromagnetic radiation (EMR) even though they were not designed to do so. There is potential for the emission can be intercepted and reconstructed for eavesdropping or even intelligence purposes. Information leakage from hand-held devices can be valuable information for the intelligence communities. This paper presented discussions on how much unintentional emission is radiated from these devices. Comparison on the level of emission is made based on manufacturers and sizes of LCD.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crime and Its Social Context: Analysis Using the Self-Organizing Map 犯罪及其社会背景:基于自组织地图的分析
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.26
Xingan Li, M. Juhola
Data mining and visualization techniques show their value in various domains but have not been broadly applied to the study of crime, which is in demand of an instrument to efficiently and effectively analyze available data. The purpose of this study is to apply the Self-Orgamizing Map (SOM) to mapping countries with different situations of socio-economic development. Supplemented by other methods, including Scatter Counter for attribute selection, and nearest neighbor search, discriminant analysis and decision trees for obtaining comparable results, the SOM is found to be a useful tool for mapping criminal phenomena through processing of multivariate data.
数据挖掘和可视化技术在各个领域都显示出其价值,但尚未广泛应用于犯罪研究,需要一种高效、有效地分析现有数据的工具。本研究的目的是应用自组织地图(SOM)来绘制具有不同社会经济发展状况的国家。辅以其他方法,包括用于属性选择的散射计数器,以及用于获得比较结果的最近邻搜索、判别分析和决策树,SOM是通过处理多变量数据来映射犯罪现象的有用工具。
{"title":"Crime and Its Social Context: Analysis Using the Self-Organizing Map","authors":"Xingan Li, M. Juhola","doi":"10.1109/EISIC.2013.26","DOIUrl":"https://doi.org/10.1109/EISIC.2013.26","url":null,"abstract":"Data mining and visualization techniques show their value in various domains but have not been broadly applied to the study of crime, which is in demand of an instrument to efficiently and effectively analyze available data. The purpose of this study is to apply the Self-Orgamizing Map (SOM) to mapping countries with different situations of socio-economic development. Supplemented by other methods, including Scatter Counter for attribute selection, and nearest neighbor search, discriminant analysis and decision trees for obtaining comparable results, the SOM is found to be a useful tool for mapping criminal phenomena through processing of multivariate data.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Visual Analysis of Heterogeneous Networks 异构网络的可视化分析
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.28
Bisharat Rasool Memon, U. Wiil
Most real-life networks are not only massive but also highly heterogeneous, involving more than one type of entity, more than one type of relationship, and multiple attributes associated with both entities and relationships. Many of the existing methods and tools don't take into account these additional modalities that make networks highly heterogenous and complex-such methods and tools are mostly limited to dealing with much simpler networks (e.g., single-mode networks or bi-modal affiliation networks). In this paper we present a novel method for visual analysis of heterogenous networks. The method is based on a visual approach to analysis that allows the user to define complex structural patterns to query the network, and further explore the returned network patterns intuitively.
大多数现实生活中的网络不仅是庞大的,而且是高度异构的,涉及不止一种类型的实体,不止一种类型的关系,以及与实体和关系相关的多个属性。许多现有的方法和工具没有考虑到这些使网络高度异构和复杂的附加模式——这些方法和工具大多局限于处理更简单的网络(例如,单模网络或双模关联网络)。本文提出了一种对异构网络进行可视化分析的新方法。该方法基于可视化的分析方法,允许用户定义复杂的结构模式来查询网络,并进一步直观地探索返回的网络模式。
{"title":"Visual Analysis of Heterogeneous Networks","authors":"Bisharat Rasool Memon, U. Wiil","doi":"10.1109/EISIC.2013.28","DOIUrl":"https://doi.org/10.1109/EISIC.2013.28","url":null,"abstract":"Most real-life networks are not only massive but also highly heterogeneous, involving more than one type of entity, more than one type of relationship, and multiple attributes associated with both entities and relationships. Many of the existing methods and tools don't take into account these additional modalities that make networks highly heterogenous and complex-such methods and tools are mostly limited to dealing with much simpler networks (e.g., single-mode networks or bi-modal affiliation networks). In this paper we present a novel method for visual analysis of heterogenous networks. The method is based on a visual approach to analysis that allows the user to define complex structural patterns to query the network, and further explore the returned network patterns intuitively.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How "Digital" is Traditional Crime? 传统犯罪有多“数字化”?
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.12
Lorena Montoya, M. Junger, P. Hartel
Measuring how much cyber crime exists is typically done by first defining cyber crime and then quantifying how many cases fit that definition. The drawback is that definitions vary across countries and many cyber crimes are recorded as traditional crimes. An alternative is to keep traditional definitions of crime and quantify the amount of associated information and communication technologies (ICT) that each contains. This research established how much ICT was used a) in the three phases of the 'crime script' (i.e. 'before', 'during' and 'after'), b) during the criminal investigation and c) in the apprehension of the suspect(s) and d) whether digital crimes differ from traditional crimes in terms of the relationships between the victim and the offender or in terms of the physical distance between them. Residential and commercial burglary, threats and fraud were investigated and 809 incidents from the Police Department of East Netherlands were studied. It was found that ICT does not affect all types of crime equally: 16% of the threats and 41% of all frauds have partial digital modus operandi (MO). To commit burglaries, however, offenders hardly ever use ICT. In 2.9% of the residential burglaries, however, bank cards were stolen and later used to steal money from a bank account. For commercial burglary there was no associated ICT. Digital crimes differ from traditional crimes in a number of ways: the geographical distance between the victim and the offender is larger, digital threats occur relatively more often between ex-partners and digital frauds occur more often between business partners compared to traditional fraud. The study found that physical tools are more often linked to apprehension than digital ones. The regression models, however, showed digital and physical tools to be equally strong at predicting apprehension. The main findings show that ICT plays a greater role in traditional crime than expected on the basis of previous research.
衡量网络犯罪的存在程度,通常是先定义网络犯罪,然后量化有多少案件符合这个定义。缺点是不同国家的定义不同,许多网络犯罪被记录为传统犯罪。另一种选择是保留传统的犯罪定义,并量化每种犯罪所包含的相关信息和通信技术(ICT)的数量。这项研究确定了a)在“犯罪脚本”的三个阶段(即:(“之前”,“期间”和“之后”),b)在刑事调查期间,c)在逮捕嫌疑人期间,以及d)数字犯罪与传统犯罪在受害者与罪犯之间的关系或他们之间的物理距离方面是否不同。调查了住宅和商业入室盗窃、威胁和欺诈,并研究了东荷兰警察局的809起事件。研究发现,信息通信技术对所有类型的犯罪的影响并不相同:16%的威胁和41%的欺诈都部分采用了数字手法。然而,罪犯很少使用信息通信技术进行盗窃。然而,在2.9%的住宅盗窃案中,银行卡被盗,随后被用来从银行账户中窃取资金。对于商业盗窃,没有相关的信息通信技术。数字犯罪与传统犯罪有很多不同之处:受害者和罪犯之间的地理距离更大,前合作伙伴之间的数字威胁相对更频繁,与传统欺诈相比,商业伙伴之间的数字欺诈更频繁。研究发现,与数字工具相比,物理工具更容易让人感到恐惧。然而,回归模型显示,数字和物理工具在预测恐惧方面同样强大。主要研究结果表明,信息通信技术在传统犯罪中的作用比以往研究所预期的要大。
{"title":"How \"Digital\" is Traditional Crime?","authors":"Lorena Montoya, M. Junger, P. Hartel","doi":"10.1109/EISIC.2013.12","DOIUrl":"https://doi.org/10.1109/EISIC.2013.12","url":null,"abstract":"Measuring how much cyber crime exists is typically done by first defining cyber crime and then quantifying how many cases fit that definition. The drawback is that definitions vary across countries and many cyber crimes are recorded as traditional crimes. An alternative is to keep traditional definitions of crime and quantify the amount of associated information and communication technologies (ICT) that each contains. This research established how much ICT was used a) in the three phases of the 'crime script' (i.e. 'before', 'during' and 'after'), b) during the criminal investigation and c) in the apprehension of the suspect(s) and d) whether digital crimes differ from traditional crimes in terms of the relationships between the victim and the offender or in terms of the physical distance between them. Residential and commercial burglary, threats and fraud were investigated and 809 incidents from the Police Department of East Netherlands were studied. It was found that ICT does not affect all types of crime equally: 16% of the threats and 41% of all frauds have partial digital modus operandi (MO). To commit burglaries, however, offenders hardly ever use ICT. In 2.9% of the residential burglaries, however, bank cards were stolen and later used to steal money from a bank account. For commercial burglary there was no associated ICT. Digital crimes differ from traditional crimes in a number of ways: the geographical distance between the victim and the offender is larger, digital threats occur relatively more often between ex-partners and digital frauds occur more often between business partners compared to traditional fraud. The study found that physical tools are more often linked to apprehension than digital ones. The regression models, however, showed digital and physical tools to be equally strong at predicting apprehension. The main findings show that ICT plays a greater role in traditional crime than expected on the basis of previous research.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1