首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
Modeling Border Traffic Flow Using Cell Phone Header Packets 使用手机报头包建模边界交通流
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.68
J. Valacich, David W. Wilson, J. Nunamaker, E. Golob
This research in progress paper describes a novel approach for improving resource allocation decision-making at ports of entry along a border. The approach involves the collection of cell phone header packets to estimate density of a population around a port of entry, and proposes that such data, if collected in real-time, could allow border agents to more effectively respond to random increases or decreases in border traffic. It is further suggested that such data could be incorporated continuously to update border flow models and help identify trends in traffic flow. The overall result of these advantages could lead to decision-makers at ports of entry being able to reduce queue times and thereby use resources more efficiently.
本文描述了一种改进边境口岸资源分配决策的新方法。该方法包括收集手机报头包,以估计入境口岸周围的人口密度,并提出,如果实时收集这些数据,可以使边境人员更有效地应对边境交通的随机增加或减少。进一步建议,可以不断地将这些数据纳入更新边界流量模型,并帮助确定交通流量的趋势。这些优势的总体结果可能导致入境口岸的决策者能够减少排队时间,从而更有效地利用资源。
{"title":"Modeling Border Traffic Flow Using Cell Phone Header Packets","authors":"J. Valacich, David W. Wilson, J. Nunamaker, E. Golob","doi":"10.1109/EISIC.2013.68","DOIUrl":"https://doi.org/10.1109/EISIC.2013.68","url":null,"abstract":"This research in progress paper describes a novel approach for improving resource allocation decision-making at ports of entry along a border. The approach involves the collection of cell phone header packets to estimate density of a population around a port of entry, and proposes that such data, if collected in real-time, could allow border agents to more effectively respond to random increases or decreases in border traffic. It is further suggested that such data could be incorporated continuously to update border flow models and help identify trends in traffic flow. The overall result of these advantages could lead to decision-makers at ports of entry being able to reduce queue times and thereby use resources more efficiently.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Data Management: Sensor-Based Port Security Use Case 语义数据管理:基于传感器的端口安全用例
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.34
A. Fensel, Michael Rogger, T. Gustavi, Andreas Horndahl, Christian Mårtenson
This work is part of the EU FP-7 project Support and describes a system-architecture to enhance port security by processing sensor data. The goal is to process vast amount of sensor readings of all types, reduce the noise in the data stream, cope with heterogeneities, detect patterns, fuse data streams and provide decision support in near real-time. We define an ontology to model the domain of sensors and events in the context of port security. The ontology is used as a common basis for our envisioned architecture. The architecture incorporates Spark wave, a schema-enhanced pattern matcher, and Impactorium, a decision support system. Finally we present an evaluation approach for our use case and conclude with on-going future work.
这项工作是欧盟FP-7项目支持的一部分,描述了通过处理传感器数据来增强端口安全性的系统架构。目标是处理所有类型的大量传感器读数,减少数据流中的噪声,处理异构性,检测模式,融合数据流并提供近乎实时的决策支持。我们定义了一个本体来对端口安全上下文中的传感器和事件域进行建模。本体被用作我们设想的体系结构的公共基础。该体系结构结合了Spark wave(一个模式增强的模式匹配器)和Impactorium(一个决策支持系统)。最后,我们为我们的用例提供了一个评估方法,并总结了正在进行的未来工作。
{"title":"Semantic Data Management: Sensor-Based Port Security Use Case","authors":"A. Fensel, Michael Rogger, T. Gustavi, Andreas Horndahl, Christian Mårtenson","doi":"10.1109/EISIC.2013.34","DOIUrl":"https://doi.org/10.1109/EISIC.2013.34","url":null,"abstract":"This work is part of the EU FP-7 project Support and describes a system-architecture to enhance port security by processing sensor data. The goal is to process vast amount of sensor readings of all types, reduce the noise in the data stream, cope with heterogeneities, detect patterns, fuse data streams and provide decision support in near real-time. We define an ontology to model the domain of sensors and events in the context of port security. The ontology is used as a common basis for our envisioned architecture. The architecture incorporates Spark wave, a schema-enhanced pattern matcher, and Impactorium, a decision support system. Finally we present an evaluation approach for our use case and conclude with on-going future work.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126916998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem 网络空间的隐私和安全:个人数据生态系统的培训视角
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.30
J. A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, S. F. Andler
There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems, processes and architectures should incorporate considerations related to both privacy and security. This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the "gamification" of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects that may involve a consortium of organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.
人们越来越认识到隐私是安全的重要组成部分。为了降低发生数据泄露的可能性,信息系统、流程和架构的设计应考虑到隐私和安全。这种结合可能受益于提供适当的培训。通过这种方式,本文打算讨论如何更好地提供培训,同时考虑到多媒体制作和培训“游戏化”的新发展。本文建议将两个框架结合使用:EduPMO框架,用于管理大型项目,这些项目可能涉及开发多媒体以提供培训的组织联盟;以及游戏开发框架,用于识别严肃游戏的主要组成部分,通过设计开发隐私培训,作为培训提供的一部分。
{"title":"Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem","authors":"J. A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, S. F. Andler","doi":"10.1109/EISIC.2013.30","DOIUrl":"https://doi.org/10.1109/EISIC.2013.30","url":null,"abstract":"There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems, processes and architectures should incorporate considerations related to both privacy and security. This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the \"gamification\" of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects that may involve a consortium of organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Multi-modal Biometric Fusion Implementation for ABC Systems ABC系统的多模态生物特征融合实现
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.71
Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez
In this paper, we introduce a multi-modal approach for traveller biometric identity verification, in the context of the Spanish Automated Border Control (ABC) implementation. An ABC is an automated system which reads and authenticates the electronic travel document, verifies the identity of the document holder, performs background checks and resolves the eligibility for border crossing. This paper focuses on the second stage of the automated process, the identity verification, based on the biometric data available in the electronic travel document. According to the nature of the travel document, a standardized facial image (1st and 2nd generation electronic Passport, Spanish electronic ID card), two standardized fingerprint images (2nd generation electronic Passport) or fingerprint Match-on-Card features (Spanish electronic ID card) are available. While the facial image can be considered the de facto standard biometric modality for ABC systems, fingerprint availability allows for security enhancement and false rejection rates improvement.
在本文中,我们介绍了一种旅行者生物识别身份验证的多模式方法,在西班牙自动边境控制(ABC)实施的背景下。ABC是一个自动系统,它读取和验证电子旅行证件,验证证件持有人的身份,进行背景调查,并解决过境资格问题。本文的重点是自动化流程的第二阶段,即基于电子旅行证件中可用的生物特征数据的身份验证。根据旅行证件的性质,可提供标准化的面部图像(第一代和第二代电子护照,西班牙电子身份证),标准化的指纹图像(第二代电子护照)或指纹匹配卡功能(西班牙电子身份证)。虽然面部图像可以被认为是ABC系统事实上的标准生物识别模式,但指纹可用性可以增强安全性并提高误拒率。
{"title":"A Multi-modal Biometric Fusion Implementation for ABC Systems","authors":"Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez","doi":"10.1109/EISIC.2013.71","DOIUrl":"https://doi.org/10.1109/EISIC.2013.71","url":null,"abstract":"In this paper, we introduce a multi-modal approach for traveller biometric identity verification, in the context of the Spanish Automated Border Control (ABC) implementation. An ABC is an automated system which reads and authenticates the electronic travel document, verifies the identity of the document holder, performs background checks and resolves the eligibility for border crossing. This paper focuses on the second stage of the automated process, the identity verification, based on the biometric data available in the electronic travel document. According to the nature of the travel document, a standardized facial image (1st and 2nd generation electronic Passport, Spanish electronic ID card), two standardized fingerprint images (2nd generation electronic Passport) or fingerprint Match-on-Card features (Spanish electronic ID card) are available. While the facial image can be considered the de facto standard biometric modality for ABC systems, fingerprint availability allows for security enhancement and false rejection rates improvement.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Decentralized Fully Redundant Cyber Secure Governmental Communications Concept 分散的全冗余网络安全政府通信概念
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.39
J. Rajamäki, Paresh Rathod, Jonathan Holmström
This paper focuses on future requirements of broadband data transmission of public protection and disaster relief, critical infrastructure protection and military, and presents the concept of redundant and secure data communication network system in the multi-organizational environment. We are proposing a fully decentralized architecture with optimized critical communication channels. Here, network actors and elements identify and authenticate by establishing physical connection. This concept also recommends, group level user-authorization mechanism for each participating organization. Their respective users of command and control centers are identified, authorized and authenticated to various data sources. The decentralized architecture concept is using the Distributed Systems intercommunication Protocol (DSiP). The concept is highly fault-tolerant in routine as well as crises operations. The software-based approach is independent of heterogeneous data communication technologies, IP networks and telecommunication operator services. The solution enables to build an effective and lasting cyber secure data network for multi organizational environment. Being a fully decentralized concept, networks of individual member organizations are virtually autonomous and hard to upset each other. That allows smooth message and information exchange to enable interoperability.
本文针对未来公共保护与救灾、关键基础设施保护、军事等领域的宽带数据传输需求,提出了多组织环境下冗余安全数据通信网络系统的概念。我们提出了一个完全去中心化的架构,优化了关键的通信渠道。在这里,网络参与者和元素通过建立物理连接来识别和验证。该概念还为每个参与组织推荐了组级用户授权机制。它们各自的指挥和控制中心用户被识别、授权和认证到各种数据源。分散式架构概念使用分布式系统通信协议(DSiP)。该概念在日常和危机操作中都具有高度容错性。基于软件的方法独立于异构数据通信技术、IP网络和电信运营商服务。该解决方案能够为多组织环境构建有效、持久的网络安全数据网络。作为一个完全分散的概念,单个成员组织的网络实际上是自治的,很难相互干扰。这允许平滑的消息和信息交换,从而实现互操作性。
{"title":"Decentralized Fully Redundant Cyber Secure Governmental Communications Concept","authors":"J. Rajamäki, Paresh Rathod, Jonathan Holmström","doi":"10.1109/EISIC.2013.39","DOIUrl":"https://doi.org/10.1109/EISIC.2013.39","url":null,"abstract":"This paper focuses on future requirements of broadband data transmission of public protection and disaster relief, critical infrastructure protection and military, and presents the concept of redundant and secure data communication network system in the multi-organizational environment. We are proposing a fully decentralized architecture with optimized critical communication channels. Here, network actors and elements identify and authenticate by establishing physical connection. This concept also recommends, group level user-authorization mechanism for each participating organization. Their respective users of command and control centers are identified, authorized and authenticated to various data sources. The decentralized architecture concept is using the Distributed Systems intercommunication Protocol (DSiP). The concept is highly fault-tolerant in routine as well as crises operations. The software-based approach is independent of heterogeneous data communication technologies, IP networks and telecommunication operator services. The solution enables to build an effective and lasting cyber secure data network for multi organizational environment. Being a fully decentralized concept, networks of individual member organizations are virtually autonomous and hard to upset each other. That allows smooth message and information exchange to enable interoperability.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World 边境控制的“瑞士军刀”方法:多威胁世界中的多任务处理
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.73
Chris Hurrey
The Border Control community uses a number of skills, techniques and technologies to achieve its objectives: everything from the skilled eye, ear and feel of the border officer to sophisticated data, image and biometric analytics. These are often used singly or in small combinations or at different stages. What might a border control system look like which used a larger number of near-simultaneous scans, checks and queries on each passenger? And how might it be evaluated? This paper examines what a 'Swiss Army Knife', multi-tool approach to border, visas and internal migration control might involve and how this multi-tool approach might solve a number of common problems. It briefly touches on the erasing of boundaries between traditional 'immigration' information systems and those of port security, carrier reservations, economic and demographic statistics, police and counter-terrorism agencies.
边境管制部门使用许多技能、技巧和技术来实现其目标:从边境官员熟练的眼睛、耳朵和感觉,到复杂的数据、图像和生物识别分析。这些通常单独使用或小组合或在不同阶段使用。如果一个边境控制系统几乎同时对每个乘客进行大量的扫描、检查和询问,那么这个系统会是什么样子呢?它如何被评估?本文探讨了“瑞士军刀”,边境,签证和内部移民控制的多工具方法可能涉及的内容,以及这种多工具方法如何解决一些常见问题。它简要地涉及消除传统“移民”信息系统与港口安全、承运人预订、经济和人口统计、警察和反恐机构之间的界限。
{"title":"The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World","authors":"Chris Hurrey","doi":"10.1109/EISIC.2013.73","DOIUrl":"https://doi.org/10.1109/EISIC.2013.73","url":null,"abstract":"The Border Control community uses a number of skills, techniques and technologies to achieve its objectives: everything from the skilled eye, ear and feel of the border officer to sophisticated data, image and biometric analytics. These are often used singly or in small combinations or at different stages. What might a border control system look like which used a larger number of near-simultaneous scans, checks and queries on each passenger? And how might it be evaluated? This paper examines what a 'Swiss Army Knife', multi-tool approach to border, visas and internal migration control might involve and how this multi-tool approach might solve a number of common problems. It briefly touches on the erasing of boundaries between traditional 'immigration' information systems and those of port security, carrier reservations, economic and demographic statistics, police and counter-terrorism agencies.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134149600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement 犯罪脊:探讨犯罪吸引因素与罪犯运动的关系
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.18
Justin Song, Valerie Spicer, P. Brantingham, Richard Frank
In this paper we present a new approach in the analysis of crime patterns by creating a formal framework for merging the concepts of crime attractors and the pull of certain locations on offender movement. This directionality, inherent to city infrastructure, underlies the decision processes of offenders when choosing movement paths towards attractors. We explore the aggregate movement patterns of offenders within six municipalities of metropolitan Vancouver. In particular, this research focuses on the relationship between multiple strong crime attractors, offender movement and the formation of crime ridges. We use a visualization technique to show how the flow of offenders towards crime attractors creates associated crime ridges connecting the crime attractors.
在本文中,我们提出了一种新的方法来分析犯罪模式,通过创建一个正式的框架来合并犯罪吸引者的概念和特定地点对罪犯运动的拉动。这种方向性是城市基础设施固有的,是违规者选择向吸引者移动路径的决策过程的基础。我们探讨了在大温哥华的六个城市的罪犯的总体运动模式。本研究特别关注多重强犯罪吸引物、罪犯流动与犯罪脊形成之间的关系。我们使用一种可视化技术来展示罪犯流向犯罪吸引点是如何创造出连接犯罪吸引点的相关犯罪脊的。
{"title":"Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement","authors":"Justin Song, Valerie Spicer, P. Brantingham, Richard Frank","doi":"10.1109/EISIC.2013.18","DOIUrl":"https://doi.org/10.1109/EISIC.2013.18","url":null,"abstract":"In this paper we present a new approach in the analysis of crime patterns by creating a formal framework for merging the concepts of crime attractors and the pull of certain locations on offender movement. This directionality, inherent to city infrastructure, underlies the decision processes of offenders when choosing movement paths towards attractors. We explore the aggregate movement patterns of offenders within six municipalities of metropolitan Vancouver. In particular, this research focuses on the relationship between multiple strong crime attractors, offender movement and the formation of crime ridges. We use a visualization technique to show how the flow of offenders towards crime attractors creates associated crime ridges connecting the crime attractors.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Semantic Linking and Contextualization for Social Forensic Text Analysis 社会司法文本分析的语义连接和语境化
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.21
Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke
With the development of social media, forensic text analysis is becoming more and more challenging as forensic analysts have begun to include this information source in their practice. In this paper, we report on our recent work related to semantic search in e-discovery and propose the use of entity and topic extraction for social media text analysis. We first describe our approach for entity linking at the 2012 Text Analysis Conference Knowledge Base Population track and then introduce the personalized tweets summarization task, where entity linking is used for semantically enriching information in a social media context.
随着社交媒体的发展,法医文本分析越来越具有挑战性,法医分析人员开始将这一信息来源纳入其实践中。在本文中,我们报告了我们最近在电子发现中与语义搜索相关的工作,并提出了将实体和主题提取用于社交媒体文本分析的方法。我们首先在2012年文本分析会议知识库人口跟踪上描述了我们的实体链接方法,然后介绍了个性化tweet摘要任务,其中实体链接用于在社交媒体上下文中丰富信息的语义。
{"title":"Semantic Linking and Contextualization for Social Forensic Text Analysis","authors":"Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke","doi":"10.1109/EISIC.2013.21","DOIUrl":"https://doi.org/10.1109/EISIC.2013.21","url":null,"abstract":"With the development of social media, forensic text analysis is becoming more and more challenging as forensic analysts have begun to include this information source in their practice. In this paper, we report on our recent work related to semantic search in e-discovery and propose the use of entity and topic extraction for social media text analysis. We first describe our approach for entity linking at the 2012 Text Analysis Conference Knowledge Base Population track and then introduce the personalized tweets summarization task, where entity linking is used for semantically enriching information in a social media context.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management 机遇与人为因素的考虑:信息安全风险管理的必要范式转变
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.32
Lisa Rajbhandari
Most of the existing Risk Analysis and Management Methods (RAMMs) focus on threat without taking account of the available opportunity to an entity. Besides, human aspects are not often given much importance in these methods. These issues create a considerable drawback as the available opportunities to an entity (organization, system, etc.) might go unnoticed which might hamper the entity from achieving its objectives. Moreover, understanding the motives of humans play an important role in guiding the risk analysis. This paper reviews several existing RAMMs to highlight the above issues and provides reasoning as to emphasize the importance of these two issues in information security management. From the analysis of the selected methods, we identified that a majority of the methods acknowledge only threat and the consideration of human factors have not been reflected. Although, the issues are not new, these still remain open and the field of risk management needs to be directed towards addressing them. The review is expected to be helpful both to the researchers and practitioners in providing relevant information to consider these issues for further improving the existing RAMMs or when developing new methods.
大多数现有的风险分析和管理方法(RAMMs)侧重于威胁,而没有考虑到实体的可用机会。此外,在这些方法中,人的方面往往不太重要。这些问题造成了相当大的缺点,因为实体(组织、系统等)的现有机会可能被忽视,这可能妨碍实体实现其目标。此外,了解人的动机对指导风险分析起着重要的作用。本文回顾了现有的几种ram,以突出上述问题,并提供了推理,以强调这两个问题在信息安全管理中的重要性。通过对所选方法的分析,我们发现大多数方法只承认威胁,没有反映对人为因素的考虑。虽然这些问题并不新鲜,但这些问题仍然存在,风险管理领域需要朝着解决这些问题的方向发展。本文的综述将为研究人员和实践者提供相关信息,以进一步改进现有的随机存储器或开发新的方法。
{"title":"Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management","authors":"Lisa Rajbhandari","doi":"10.1109/EISIC.2013.32","DOIUrl":"https://doi.org/10.1109/EISIC.2013.32","url":null,"abstract":"Most of the existing Risk Analysis and Management Methods (RAMMs) focus on threat without taking account of the available opportunity to an entity. Besides, human aspects are not often given much importance in these methods. These issues create a considerable drawback as the available opportunities to an entity (organization, system, etc.) might go unnoticed which might hamper the entity from achieving its objectives. Moreover, understanding the motives of humans play an important role in guiding the risk analysis. This paper reviews several existing RAMMs to highlight the above issues and provides reasoning as to emphasize the importance of these two issues in information security management. From the analysis of the selected methods, we identified that a majority of the methods acknowledge only threat and the consideration of human factors have not been reflected. Although, the issues are not new, these still remain open and the field of risk management needs to be directed towards addressing them. The review is expected to be helpful both to the researchers and practitioners in providing relevant information to consider these issues for further improving the existing RAMMs or when developing new methods.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Browse and Search in Maritime Document Collections 浏览和搜索海事文件集
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.57
V. Dragos
This paper presents an approach to explore collection of documents in the maritime domain. Documents are reports created by experts in order to explain suspicious vessel behaviours and the collection is semantically integrated by using a domain ontology and associated instance elements. Browse and search strategies allows us to find events occurring in various maritime areas and to highlight clues explaining abnormal behaviour of vessels.
本文提出了一种探索海事领域文献收集的方法。文档是由专家创建的报告,用于解释可疑的船只行为,并且通过使用领域本体和相关实例元素将集合在语义上集成。浏览和搜索策略使我们能够发现不同海域发生的事件,并突出显示解释船舶异常行为的线索。
{"title":"Browse and Search in Maritime Document Collections","authors":"V. Dragos","doi":"10.1109/EISIC.2013.57","DOIUrl":"https://doi.org/10.1109/EISIC.2013.57","url":null,"abstract":"This paper presents an approach to explore collection of documents in the maritime domain. Documents are reports created by experts in order to explain suspicious vessel behaviours and the collection is semantically integrated by using a domain ontology and associated instance elements. Browse and search strategies allows us to find events occurring in various maritime areas and to highlight clues explaining abnormal behaviour of vessels.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1