Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529356
Kunzhe Wang, Huaitie Xiao, Yaowen Fu
Support vector data description (SVDD) is a popular kernel method for novelty detection, which constructs a spherical boundary around the normal class with minimum volume. Sphere being a special case of ellipsoid, it thus will be more general to extend classical SVDD to ellipsoidal boundary and better description ability can be anticipated. In this paper, we propose an ellipsoidal SVDD (ESVDD) by incorporating the ellipsoid estimation into kernel principal component analysis (kernel PCA). A minimum volume enclosing ellipsoid (MVEE) is constructed around a dataset in the kernel PCA subspace which can be solved through convex optimization. The outlyingness for new object is measured by the Mahalanobis distance. Experiments on artificial dataset validate the effectiveness of our method.
支持向量数据描述(SVDD)是一种流行的新颖性检测核方法,它在最小体积的正常类周围构造一个球形边界。球是椭球体的一种特例,因此将经典奇异向量分解扩展到椭球体边界将具有更一般的通用性,并具有更好的描述能力。本文将椭球估计与核主成分分析(kernel principal component analysis, PCA)相结合,提出了椭球SVDD (ESVDD)。在核主成分分析子空间中,围绕数据集构造了一个最小体积封闭椭球(MVEE),该椭球可以通过凸优化来求解。新天体的距离是用马氏距离来测量的。在人工数据集上的实验验证了该方法的有效性。
{"title":"Ellipsoidal support vector data description in kernel PCA subspace","authors":"Kunzhe Wang, Huaitie Xiao, Yaowen Fu","doi":"10.1109/DIPDMWC.2016.7529356","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529356","url":null,"abstract":"Support vector data description (SVDD) is a popular kernel method for novelty detection, which constructs a spherical boundary around the normal class with minimum volume. Sphere being a special case of ellipsoid, it thus will be more general to extend classical SVDD to ellipsoidal boundary and better description ability can be anticipated. In this paper, we propose an ellipsoidal SVDD (ESVDD) by incorporating the ellipsoid estimation into kernel principal component analysis (kernel PCA). A minimum volume enclosing ellipsoid (MVEE) is constructed around a dataset in the kernel PCA subspace which can be solved through convex optimization. The outlyingness for new object is measured by the Mahalanobis distance. Experiments on artificial dataset validate the effectiveness of our method.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125125517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529375
N. Chervyakov, P. Lyakhov, A. S. Ionisyan, M. Valueva
In this paper we propose a new architecture of a smoothing filter in the RNS. The problem of computationally complex division operation performing is solved by replacing this operation by division with the remainder. This makes it possible to replace the division by subtraction and a multiplication in the RNS when using RNS modulo as a divisor. Simulation of smoothing filter hardware implementation showed an 12,5% increase the processing speed by using the proposed architecture in comparison with smoothing filter functioning in BNS and 46,7% increase the processing speed in comparison with known smoothing filter architecture in RNS. Besides, hardware costs for the implementation of the proposed architecture on average 25% less in comparison with known smoothing filter architecture in RNS.
{"title":"High-speed smoothing filter in the Residue Number System","authors":"N. Chervyakov, P. Lyakhov, A. S. Ionisyan, M. Valueva","doi":"10.1109/DIPDMWC.2016.7529375","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529375","url":null,"abstract":"In this paper we propose a new architecture of a smoothing filter in the RNS. The problem of computationally complex division operation performing is solved by replacing this operation by division with the remainder. This makes it possible to replace the division by subtraction and a multiplication in the RNS when using RNS modulo as a divisor. Simulation of smoothing filter hardware implementation showed an 12,5% increase the processing speed by using the proposed architecture in comparison with smoothing filter functioning in BNS and 46,7% increase the processing speed in comparison with known smoothing filter architecture in RNS. Besides, hardware costs for the implementation of the proposed architecture on average 25% less in comparison with known smoothing filter architecture in RNS.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529383
Diana Gabriela Noemí Benítez-Mejía, G. Sánchez-Pérez, L. K. Toscano-Medina
The evolution of the Technology and its use in the daily life and business has made that the people trust in mobile devices to perform important activities. Hackers have focus in them due to the information they can get. In recent years, the growth of malware towards mobile devices has been outstanding. In this paper we present mobile threats and some of the main attack vectors that hackers use to steal information. Taking into account that applications are necessary in Android, we perform the analysis of a sample of the Remote Access Trojan called Dendroid, due to it is easy to found this kind of Trojans in Android applications. Also, as an example of how dangerous for the privacy of the users are the applications that request more permissions than those they need to run; ending with the encouragement to developers and researches to find alternatives to solve this security breach in Android.
{"title":"Android applications and security breach","authors":"Diana Gabriela Noemí Benítez-Mejía, G. Sánchez-Pérez, L. K. Toscano-Medina","doi":"10.1109/DIPDMWC.2016.7529383","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529383","url":null,"abstract":"The evolution of the Technology and its use in the daily life and business has made that the people trust in mobile devices to perform important activities. Hackers have focus in them due to the information they can get. In recent years, the growth of malware towards mobile devices has been outstanding. In this paper we present mobile threats and some of the main attack vectors that hackers use to steal information. Taking into account that applications are necessary in Android, we perform the analysis of a sample of the Remote Access Trojan called Dendroid, due to it is easy to found this kind of Trojans in Android applications. Also, as an example of how dangerous for the privacy of the users are the applications that request more permissions than those they need to run; ending with the encouragement to developers and researches to find alternatives to solve this security breach in Android.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529405
Narungsun Wilaisakoolyong
In 2016, Thailand had integrated with the ASEAN Economic Community (AEC). This causes technological competition increasing. Information Technologists are particularly important in this competition. The main aim of this research presents the essential features and characteristics of Information Technologists that were desired by the enterprises. Population of the study were the enterprises which run a business in Thailand. Samples of the research were 139 enterprises which were random selected. The samples comprise of 83 Thai enterprises and 56 foreign enterprises. The statistics employed for analyzing the data were mean, standard deviation and independent t-test. The research results show that enterprises need Information Technologists who have four essential features. These are Knowledge and Abilities' Characteristics, Management's Characteristics, Information Technology Skill's Licenses, Ethics and Moral's Characteristics. If Information Technologists have these features and characteristics, they will be desired by enterprises. Entrepreneurs are confident that they can work more efficiently.
{"title":"The Information Technologists that were desired by enterprises in Thailand","authors":"Narungsun Wilaisakoolyong","doi":"10.1109/DIPDMWC.2016.7529405","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529405","url":null,"abstract":"In 2016, Thailand had integrated with the ASEAN Economic Community (AEC). This causes technological competition increasing. Information Technologists are particularly important in this competition. The main aim of this research presents the essential features and characteristics of Information Technologists that were desired by the enterprises. Population of the study were the enterprises which run a business in Thailand. Samples of the research were 139 enterprises which were random selected. The samples comprise of 83 Thai enterprises and 56 foreign enterprises. The statistics employed for analyzing the data were mean, standard deviation and independent t-test. The research results show that enterprises need Information Technologists who have four essential features. These are Knowledge and Abilities' Characteristics, Management's Characteristics, Information Technology Skill's Licenses, Ethics and Moral's Characteristics. If Information Technologists have these features and characteristics, they will be desired by enterprises. Entrepreneurs are confident that they can work more efficiently.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529362
E. Okhapkina, A. Tarasov, V. Okhapkin
The article deals with the task of identifying the elements of the information influence in messages of social networks. Structural-logical scheme of solving the problem is described. We consider the cognitive aspects and approach to building patterns of network messages that contain the elements of information influence. It is presented scheme of weighting terms in network messages and the method of calculating the degree of proximity of the analyzed messages and patterns.
{"title":"Problem of identifying destructive informational influence in social networks","authors":"E. Okhapkina, A. Tarasov, V. Okhapkin","doi":"10.1109/DIPDMWC.2016.7529362","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529362","url":null,"abstract":"The article deals with the task of identifying the elements of the information influence in messages of social networks. Structural-logical scheme of solving the problem is described. We consider the cognitive aspects and approach to building patterns of network messages that contain the elements of information influence. It is presented scheme of weighting terms in network messages and the method of calculating the degree of proximity of the analyzed messages and patterns.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529367
Nabanita Das, A. Roy, S. DasBit
In Delay-Tolerant Networks (DTNs), data is forwarded opportunistically upon contact because of intermittent connectivity and network sparsity. To address the problem of selecting appropriate relay nodes for data forwarding, nowadays location information of the nodes is used in the design of DTN routing schemes. But the existing schemes lack in considering energy-constraints of the nodes. In this paper, we propose a location-based energy-aware routing scheme to deliver data to the destination. The proposed scheme selects relays for data delivery based on the location as well as on the residual energy of the DTN nodes. Exhaustive simulation is performed using ONE simulator to evaluate the comparative performance of our proposed scheme with an existing state-of-the-art competing scheme. We claim that our scheme achieves higher delivery ratio and longer network lifetime in terms of average residual energy compared to the competing scheme. Our claim is validated through qualitative and quantitative performance analyses.
{"title":"LionBEAR: A location based energy aware routing scheme in DTNs","authors":"Nabanita Das, A. Roy, S. DasBit","doi":"10.1109/DIPDMWC.2016.7529367","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529367","url":null,"abstract":"In Delay-Tolerant Networks (DTNs), data is forwarded opportunistically upon contact because of intermittent connectivity and network sparsity. To address the problem of selecting appropriate relay nodes for data forwarding, nowadays location information of the nodes is used in the design of DTN routing schemes. But the existing schemes lack in considering energy-constraints of the nodes. In this paper, we propose a location-based energy-aware routing scheme to deliver data to the destination. The proposed scheme selects relays for data delivery based on the location as well as on the residual energy of the DTN nodes. Exhaustive simulation is performed using ONE simulator to evaluate the comparative performance of our proposed scheme with an existing state-of-the-art competing scheme. We claim that our scheme achieves higher delivery ratio and longer network lifetime in terms of average residual energy compared to the competing scheme. Our claim is validated through qualitative and quantitative performance analyses.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128659350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529413
A. I. Ivanov, V. Kulagin, Y. M. Kuznetsov, G. M. Chulkova, A. Ivannikov
We demonstrate that classical quadratic forms are not able to solve the problem of recognizing high-dimensional images. The “deep” Galushkin-Hinton neural networks can solve the problem of high-dimensional image recognition, but their training has exponential computational complexity. It is technically impossible to train and retrain a “deep” neural network rapidly. For mobile “artificial nose” systems we proposed to employ a number of “wide” neural networks trained in accordance with (GOST R 52633.5-2011). This standardized learning algorithm has a linear computational complexity, i.e. for each new smell image a time of about 0.3 seconds is sufficient for creating and training a new neural network with 2024 inputs and 256 outputs. This leads to the possibility of the rapid training of the artificial intelligence “artificial nose” and a gradual expansion of its database consisting of 10 000 or more trained artificial neural networks.
我们证明了经典的二次型不能解决高维图像的识别问题。“深度”Galushkin-Hinton神经网络可以解决高维图像识别问题,但其训练具有指数级的计算复杂度。从技术上讲,快速训练和再训练一个“深度”神经网络是不可能的。对于移动“人造鼻子”系统,我们建议采用许多根据(GOST R 52633.5-2011)训练的“宽”神经网络。这种标准化的学习算法具有线性计算复杂度,即对于每个新的气味图像,大约0.3秒的时间足以创建和训练一个具有2024个输入和256个输出的新神经网络。这使得人工智能“人工鼻子”的快速训练成为可能,并逐渐扩大其由10000个或更多训练过的人工神经网络组成的数据库。
{"title":"High-dimensional neural-network artificial intelligence capable of quick learning to recognize a new smell, and gradually expanding the database","authors":"A. I. Ivanov, V. Kulagin, Y. M. Kuznetsov, G. M. Chulkova, A. Ivannikov","doi":"10.1109/DIPDMWC.2016.7529413","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529413","url":null,"abstract":"We demonstrate that classical quadratic forms are not able to solve the problem of recognizing high-dimensional images. The “deep” Galushkin-Hinton neural networks can solve the problem of high-dimensional image recognition, but their training has exponential computational complexity. It is technically impossible to train and retrain a “deep” neural network rapidly. For mobile “artificial nose” systems we proposed to employ a number of “wide” neural networks trained in accordance with (GOST R 52633.5-2011). This standardized learning algorithm has a linear computational complexity, i.e. for each new smell image a time of about 0.3 seconds is sufficient for creating and training a new neural network with 2024 inputs and 256 outputs. This leads to the possibility of the rapid training of the artificial intelligence “artificial nose” and a gradual expansion of its database consisting of 10 000 or more trained artificial neural networks.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529387
S. Konev, A. S. Kulagin, N. V. Morozov, I. Levakin
The authors analyze some major problems of developing competent human resources, first of all legal experts, in the electronic commerce (e-commerce) legal protection sphere. To date, the educative process has been evolving mainly around technically- or economically-oriented academic programmes; however, in actual practice there is a strong demand for an integrative approach to education that implies the acquisition of comprehensive knowledge including legal knowledge among others. Starting out from such courses already having been taught by NRNU MEPhI for years as “Technical aspects of information security”, “Legal regulation of e-document flow and making use of digital signatures” as well as several others, the authors suggest that such kind of a comprehensive approach be applied to the specialist training in the sphere of e-commerce legal protection.
{"title":"Current issues in education as pertaining to the realm of e-commerce legal protection","authors":"S. Konev, A. S. Kulagin, N. V. Morozov, I. Levakin","doi":"10.1109/DIPDMWC.2016.7529387","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529387","url":null,"abstract":"The authors analyze some major problems of developing competent human resources, first of all legal experts, in the electronic commerce (e-commerce) legal protection sphere. To date, the educative process has been evolving mainly around technically- or economically-oriented academic programmes; however, in actual practice there is a strong demand for an integrative approach to education that implies the acquisition of comprehensive knowledge including legal knowledge among others. Starting out from such courses already having been taught by NRNU MEPhI for years as “Technical aspects of information security”, “Legal regulation of e-document flow and making use of digital signatures” as well as several others, the authors suggest that such kind of a comprehensive approach be applied to the specialist training in the sphere of e-commerce legal protection.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133543976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529393
S. Kulik, D. Nikonets
Forensic handwriting examination is one of the most sophisticated and controversial in terms of the results objectivity. One reason for this is that the result of the examination is affected by the subjectivity of the expert. The article suggests a number of methods to reduce the impact of human factors on the results of handwriting examination. First of all, it is the development of quantitative techniques for handwriting analysis, allowing obtaining scientifically grounded results of the study. As an example of those techniques, technique for identification (verification) of the writer of the handwritten text is described. In addition, as a way to reduce the influence of the human factor, it is suggested to pay attention to improving the skills of existing experts and training of new experts for forensic handwriting examination. These problems can be partly solved by using presented automated workplace of forensic handwriting expert “FHWE v.1.0”.
{"title":"Forensic handwriting examination and human factors: Improving the practice through automation and expert training","authors":"S. Kulik, D. Nikonets","doi":"10.1109/DIPDMWC.2016.7529393","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529393","url":null,"abstract":"Forensic handwriting examination is one of the most sophisticated and controversial in terms of the results objectivity. One reason for this is that the result of the examination is affected by the subjectivity of the expert. The article suggests a number of methods to reduce the impact of human factors on the results of handwriting examination. First of all, it is the development of quantitative techniques for handwriting analysis, allowing obtaining scientifically grounded results of the study. As an example of those techniques, technique for identification (verification) of the writer of the handwritten text is described. In addition, as a way to reduce the influence of the human factor, it is suggested to pay attention to improving the skills of existing experts and training of new experts for forensic handwriting examination. These problems can be partly solved by using presented automated workplace of forensic handwriting expert “FHWE v.1.0”.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-06DOI: 10.1109/DIPDMWC.2016.7529386
Ilane Karise Barbosa Cunha, Ahmed Patel, Andre Luiz Moura dos Santos, J. Celestino
With the exponential growth of information communication technology (ICT), cybercrimes have grown equally, culminating in investigation, solving such crimes and prosecuting the criminals. This article presents a proposal for the education, training and certified qualification of Brazilian police officers in order to prepare them so that they can be as knowledgeable, reliable, efficient and effective as possible. The proposal presents two types of training and qualification: the first, police officers whose primary focus is not cybercrime per se, but who as first responders are likely to encounter ICT activities as part of their work in fighting cybercrime; and the second, police officers who are involved in cybercrime investigations but expected to be classified as specialists. The proposal places strong emphasis on practical hands-on exercises, crime-scene hypothetical laboratories scenarios, actual and mock case studies and workshops to highly skilled Brazilian police officers as world class investigators. To meet this target, the proposal includes an outline of the proposed syllabus and laboratory practical sessions for each level of training to evolve specialist investigators.
{"title":"A proposal of educating Brazilian police officers for cybercrime investigation & prosecution","authors":"Ilane Karise Barbosa Cunha, Ahmed Patel, Andre Luiz Moura dos Santos, J. Celestino","doi":"10.1109/DIPDMWC.2016.7529386","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529386","url":null,"abstract":"With the exponential growth of information communication technology (ICT), cybercrimes have grown equally, culminating in investigation, solving such crimes and prosecuting the criminals. This article presents a proposal for the education, training and certified qualification of Brazilian police officers in order to prepare them so that they can be as knowledgeable, reliable, efficient and effective as possible. The proposal presents two types of training and qualification: the first, police officers whose primary focus is not cybercrime per se, but who as first responders are likely to encounter ICT activities as part of their work in fighting cybercrime; and the second, police officers who are involved in cybercrime investigations but expected to be classified as specialists. The proposal places strong emphasis on practical hands-on exercises, crime-scene hypothetical laboratories scenarios, actual and mock case studies and workshops to highly skilled Brazilian police officers as world class investigators. To meet this target, the proposal includes an outline of the proposed syllabus and laboratory practical sessions for each level of training to evolve specialist investigators.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128172050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}