J. Valacich, David W. Wilson, J. Nunamaker, E. Golob
{"title":"Modeling Border Traffic Flow Using Cell Phone Header Packets","authors":"J. Valacich, David W. Wilson, J. Nunamaker, E. Golob","doi":"10.1109/EISIC.2013.68","DOIUrl":"https://doi.org/10.1109/EISIC.2013.68","url":null,"abstract":"This research in progress paper describes a novel approach for improving resource allocation decision-making at ports of entry along a border. The approach involves the collection of cell phone header packets to estimate density of a population around a port of entry, and proposes that such data, if collected in real-time, could allow border agents to more effectively respond to random increases or decreases in border traffic. It is further suggested that such data could be incorporated continuously to update border flow models and help identify trends in traffic flow. The overall result of these advantages could lead to decision-makers at ports of entry being able to reduce queue times and thereby use resources more efficiently.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Fensel, Michael Rogger, T. Gustavi, Andreas Horndahl, Christian Mårtenson
{"title":"Semantic Data Management: Sensor-Based Port Security Use Case","authors":"A. Fensel, Michael Rogger, T. Gustavi, Andreas Horndahl, Christian Mårtenson","doi":"10.1109/EISIC.2013.34","DOIUrl":"https://doi.org/10.1109/EISIC.2013.34","url":null,"abstract":"This work is part of the EU FP-7 project Support and describes a system-architecture to enhance port security by processing sensor data. The goal is to process vast amount of sensor readings of all types, reduce the noise in the data stream, cope with heterogeneities, detect patterns, fuse data streams and provide decision support in near real-time. We define an ontology to model the domain of sensors and events in the context of port security. The ontology is used as a common basis for our envisioned architecture. The architecture incorporates Spark wave, a schema-enhanced pattern matcher, and Impactorium, a decision support system. Finally we present an evaluation approach for our use case and conclude with on-going future work.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126916998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, S. F. Andler
{"title":"Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem","authors":"J. A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, S. F. Andler","doi":"10.1109/EISIC.2013.30","DOIUrl":"https://doi.org/10.1109/EISIC.2013.30","url":null,"abstract":"There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems, processes and architectures should incorporate considerations related to both privacy and security. This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the \"gamification\" of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects that may involve a consortium of organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez
{"title":"A Multi-modal Biometric Fusion Implementation for ABC Systems","authors":"Daniel Cuesta Cantarero, David Antonio Perez Herrero, Fernando Martin Mendez","doi":"10.1109/EISIC.2013.71","DOIUrl":"https://doi.org/10.1109/EISIC.2013.71","url":null,"abstract":"In this paper, we introduce a multi-modal approach for traveller biometric identity verification, in the context of the Spanish Automated Border Control (ABC) implementation. An ABC is an automated system which reads and authenticates the electronic travel document, verifies the identity of the document holder, performs background checks and resolves the eligibility for border crossing. This paper focuses on the second stage of the automated process, the identity verification, based on the biometric data available in the electronic travel document. According to the nature of the travel document, a standardized facial image (1st and 2nd generation electronic Passport, Spanish electronic ID card), two standardized fingerprint images (2nd generation electronic Passport) or fingerprint Match-on-Card features (Spanish electronic ID card) are available. While the facial image can be considered the de facto standard biometric modality for ABC systems, fingerprint availability allows for security enhancement and false rejection rates improvement.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized Fully Redundant Cyber Secure Governmental Communications Concept","authors":"J. Rajamäki, Paresh Rathod, Jonathan Holmström","doi":"10.1109/EISIC.2013.39","DOIUrl":"https://doi.org/10.1109/EISIC.2013.39","url":null,"abstract":"This paper focuses on future requirements of broadband data transmission of public protection and disaster relief, critical infrastructure protection and military, and presents the concept of redundant and secure data communication network system in the multi-organizational environment. We are proposing a fully decentralized architecture with optimized critical communication channels. Here, network actors and elements identify and authenticate by establishing physical connection. This concept also recommends, group level user-authorization mechanism for each participating organization. Their respective users of command and control centers are identified, authorized and authenticated to various data sources. The decentralized architecture concept is using the Distributed Systems intercommunication Protocol (DSiP). The concept is highly fault-tolerant in routine as well as crises operations. The software-based approach is independent of heterogeneous data communication technologies, IP networks and telecommunication operator services. The solution enables to build an effective and lasting cyber secure data network for multi organizational environment. Being a fully decentralized concept, networks of individual member organizations are virtually autonomous and hard to upset each other. That allows smooth message and information exchange to enable interoperability.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116506227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World","authors":"Chris Hurrey","doi":"10.1109/EISIC.2013.73","DOIUrl":"https://doi.org/10.1109/EISIC.2013.73","url":null,"abstract":"The Border Control community uses a number of skills, techniques and technologies to achieve its objectives: everything from the skilled eye, ear and feel of the border officer to sophisticated data, image and biometric analytics. These are often used singly or in small combinations or at different stages. What might a border control system look like which used a larger number of near-simultaneous scans, checks and queries on each passenger? And how might it be evaluated? This paper examines what a 'Swiss Army Knife', multi-tool approach to border, visas and internal migration control might involve and how this multi-tool approach might solve a number of common problems. It briefly touches on the erasing of boundaries between traditional 'immigration' information systems and those of port security, carrier reservations, economic and demographic statistics, police and counter-terrorism agencies.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134149600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Justin Song, Valerie Spicer, P. Brantingham, Richard Frank
{"title":"Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement","authors":"Justin Song, Valerie Spicer, P. Brantingham, Richard Frank","doi":"10.1109/EISIC.2013.18","DOIUrl":"https://doi.org/10.1109/EISIC.2013.18","url":null,"abstract":"In this paper we present a new approach in the analysis of crime patterns by creating a formal framework for merging the concepts of crime attractors and the pull of certain locations on offender movement. This directionality, inherent to city infrastructure, underlies the decision processes of offenders when choosing movement paths towards attractors. We explore the aggregate movement patterns of offenders within six municipalities of metropolitan Vancouver. In particular, this research focuses on the relationship between multiple strong crime attractors, offender movement and the formation of crime ridges. We use a visualization technique to show how the flow of offenders towards crime attractors creates associated crime ridges connecting the crime attractors.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke
{"title":"Semantic Linking and Contextualization for Social Forensic Text Analysis","authors":"Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke","doi":"10.1109/EISIC.2013.21","DOIUrl":"https://doi.org/10.1109/EISIC.2013.21","url":null,"abstract":"With the development of social media, forensic text analysis is becoming more and more challenging as forensic analysts have begun to include this information source in their practice. In this paper, we report on our recent work related to semantic search in e-discovery and propose the use of entity and topic extraction for social media text analysis. We first describe our approach for entity linking at the 2012 Text Analysis Conference Knowledge Base Population track and then introduce the personalized tweets summarization task, where entity linking is used for semantically enriching information in a social media context.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management","authors":"Lisa Rajbhandari","doi":"10.1109/EISIC.2013.32","DOIUrl":"https://doi.org/10.1109/EISIC.2013.32","url":null,"abstract":"Most of the existing Risk Analysis and Management Methods (RAMMs) focus on threat without taking account of the available opportunity to an entity. Besides, human aspects are not often given much importance in these methods. These issues create a considerable drawback as the available opportunities to an entity (organization, system, etc.) might go unnoticed which might hamper the entity from achieving its objectives. Moreover, understanding the motives of humans play an important role in guiding the risk analysis. This paper reviews several existing RAMMs to highlight the above issues and provides reasoning as to emphasize the importance of these two issues in information security management. From the analysis of the selected methods, we identified that a majority of the methods acknowledge only threat and the consideration of human factors have not been reflected. Although, the issues are not new, these still remain open and the field of risk management needs to be directed towards addressing them. The review is expected to be helpful both to the researchers and practitioners in providing relevant information to consider these issues for further improving the existing RAMMs or when developing new methods.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Browse and Search in Maritime Document Collections","authors":"V. Dragos","doi":"10.1109/EISIC.2013.57","DOIUrl":"https://doi.org/10.1109/EISIC.2013.57","url":null,"abstract":"This paper presents an approach to explore collection of documents in the maritime domain. Documents are reports created by experts in order to explain suspicious vessel behaviours and the collection is semantically integrated by using a domain ontology and associated instance elements. Browse and search strategies allows us to find events occurring in various maritime areas and to highlight clues explaining abnormal behaviour of vessels.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}