{"title":"The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design","authors":"C. F. L. Resendez","doi":"10.1109/EISIC.2013.43","DOIUrl":"https://doi.org/10.1109/EISIC.2013.43","url":null,"abstract":"Information Security infrastructures contain information that originates from an organization's day-to-day operations, is stored for current or future use and whose nature tends to fall into different categories. Because of the fact that virtually all organizations have grown to depend in their internal information systems to operate and take decisions, this information has to be safeguarded in order to assure its three main properties: Confidentiality, integrity and availability. Once this need is identified by an organization, the main challenge is the adequate planning and successful deployment of an InfoSec infrastructure, which are processes that are often prone to errors that lead to defective solutions, wasted resources and an increasing risk of information theft, destruction, alteration and unauthorized dissemination. The main concept addressed in this paper is the use of the Intelligence Cycle (IC) as a design tool that helps an organization to correctly assess the risks that the organization is facing, the InfoSec resources at hand and the ones that it needs, the way it will allocate these resources in order to put them to work for the benefit of the organization and the way it will monitor this infrastructure in order to assure a proper level of protection.","PeriodicalId":193226,"journal":{"name":"European Intelligence and Security Informatics Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community of Intelligence: The Secret Behind Intelligence-Led Policing","authors":"M. Hengst, J.H.R. ter Mors","doi":"10.1109/EISIC.2012.15","DOIUrl":"https://doi.org/10.1109/EISIC.2012.15","url":null,"abstract":"Intelligence-led policing is the use of analyzed information by decision makers to decide on police resources. Analysis is very important in this and increasingly needs to be a collaborative effort: tools, techniques and the complexity of crimes far exceeds the capacity and expertise of any single analyst. Analysts have to collaborate to create an understanding. In this paper we describe how the Dutch police force has built a community of intelligence in which analysts can collaborate to create intelligence reports for intelligence-led policing.","PeriodicalId":193226,"journal":{"name":"European Intelligence and Security Informatics Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127462356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organization Network Construction and Understanding Based on Photo Face Recognition","authors":"Bo Li, Duoyong Sun, Julei Fu, Zi-Han Lin","doi":"10.1109/EISIC.2013.52","DOIUrl":"https://doi.org/10.1109/EISIC.2013.52","url":null,"abstract":"In this paper, we look into the construction processing of the organization network derived from photo collection with face recognition algorithms in different scenarios, and propose the calculating method to measure the construction effectiveness. The analysis method will provide a new approach for using the online multimedia information to understanding the organization relationship and characteristics.","PeriodicalId":193226,"journal":{"name":"European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}