European Intelligence and Security Informatics Conference最新文献

筛选
英文 中文
The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design 情报周期作为有效信息安全基础设施设计的工具
European Intelligence and Security Informatics Conference Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.43
C. F. L. Resendez
{"title":"The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design","authors":"C. F. L. Resendez","doi":"10.1109/EISIC.2013.43","DOIUrl":"https://doi.org/10.1109/EISIC.2013.43","url":null,"abstract":"Information Security infrastructures contain information that originates from an organization's day-to-day operations, is stored for current or future use and whose nature tends to fall into different categories. Because of the fact that virtually all organizations have grown to depend in their internal information systems to operate and take decisions, this information has to be safeguarded in order to assure its three main properties: Confidentiality, integrity and availability. Once this need is identified by an organization, the main challenge is the adequate planning and successful deployment of an InfoSec infrastructure, which are processes that are often prone to errors that lead to defective solutions, wasted resources and an increasing risk of information theft, destruction, alteration and unauthorized dissemination. The main concept addressed in this paper is the use of the Intelligence Cycle (IC) as a design tool that helps an organization to correctly assess the risks that the organization is facing, the InfoSec resources at hand and the ones that it needs, the way it will allocate these resources in order to put them to work for the benefit of the organization and the way it will monitor this infrastructure in order to assure a proper level of protection.","PeriodicalId":193226,"journal":{"name":"European Intelligence and Security Informatics Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community of Intelligence: The Secret Behind Intelligence-Led Policing 情报共同体:情报主导警务背后的秘密
European Intelligence and Security Informatics Conference Pub Date : 2012-08-22 DOI: 10.1109/EISIC.2012.15
M. Hengst, J.H.R. ter Mors
{"title":"Community of Intelligence: The Secret Behind Intelligence-Led Policing","authors":"M. Hengst, J.H.R. ter Mors","doi":"10.1109/EISIC.2012.15","DOIUrl":"https://doi.org/10.1109/EISIC.2012.15","url":null,"abstract":"Intelligence-led policing is the use of analyzed information by decision makers to decide on police resources. Analysis is very important in this and increasingly needs to be a collaborative effort: tools, techniques and the complexity of crimes far exceeds the capacity and expertise of any single analyst. Analysts have to collaborate to create an understanding. In this paper we describe how the Dutch police force has built a community of intelligence in which analysts can collaborate to create intelligence reports for intelligence-led policing.","PeriodicalId":193226,"journal":{"name":"European Intelligence and Security Informatics Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127462356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Organization Network Construction and Understanding Based on Photo Face Recognition 基于照片人脸识别的组织网络构建与理解
European Intelligence and Security Informatics Conference Pub Date : 1900-01-01 DOI: 10.1109/EISIC.2013.52
Bo Li, Duoyong Sun, Julei Fu, Zi-Han Lin
{"title":"Organization Network Construction and Understanding Based on Photo Face Recognition","authors":"Bo Li, Duoyong Sun, Julei Fu, Zi-Han Lin","doi":"10.1109/EISIC.2013.52","DOIUrl":"https://doi.org/10.1109/EISIC.2013.52","url":null,"abstract":"In this paper, we look into the construction processing of the organization network derived from photo collection with face recognition algorithms in different scenarios, and propose the calculating method to measure the construction effectiveness. The analysis method will provide a new approach for using the online multimedia information to understanding the organization relationship and characteristics.","PeriodicalId":193226,"journal":{"name":"European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信