2017 European Intelligence and Security Informatics Conference (EISIC)最新文献

筛选
英文 中文
Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal Intelligence 行为标记:弥合犯罪情报中分析艺术与分析科学之间的鸿沟
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-12-28 DOI: 10.1109/EISIC.2017.30
Junayed Islam, B. Wong
{"title":"Behavioural Markers: Bridging the Gap between Art of Analysis and Science of Analytics in Criminal Intelligence","authors":"Junayed Islam, B. Wong","doi":"10.1109/EISIC.2017.30","DOIUrl":"https://doi.org/10.1109/EISIC.2017.30","url":null,"abstract":"Studying how intelligence analysts use interaction in visualization systems is an important part of evaluating how well these interactions support analysis needs, like generating insights or performing tasks. Intelligence analysis is inherently a fluid activity involving transitions between mental and interaction states through analytic processes. A gap exists to complement these transitions at micro-analytic level during data exploration or task performance. We propose Behavioural markers (BMs) which are representatives of the action choices that analysts make during their analytical processes as the bridge between human cognition and computation through semantic interaction. A low level semantic action sequence computation technique has been proposed to extract these BMs from captured process log. Our proposed computational technique can supplement the problems of existing qualitative approaches to extract such BMs.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128263516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Crime Scripts: One CCTV Footage—Twenty-One Scripts 犯罪剧本的比较分析:一个CCTV录像- 21个剧本
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-11 DOI: 10.1109/EISIC.2017.23
H. Borrion, Hashem Dehghanniri, Yuanxi Li
{"title":"Comparative Analysis of Crime Scripts: One CCTV Footage—Twenty-One Scripts","authors":"H. Borrion, Hashem Dehghanniri, Yuanxi Li","doi":"10.1109/EISIC.2017.23","DOIUrl":"https://doi.org/10.1109/EISIC.2017.23","url":null,"abstract":"In recent years, there has been a growing interest in the modelling of crime commission processes, in particular crime scripting, in physical and cyber spaces. This article aims to demonstrate the limits of unstructured scripting approaches, and advocates the development of more systematic techniques. For this, we examined he differences and similarities between various scripts. Twenty-one participants were trained in crime scripting, and tasked to produce individual scripts based on the same video footage of a shop robbery. Content analysis was applied to the scripts, which involved classifying the different steps of the crime commission process and analyzing their distributions. A scoring system was then developed to assess the relative degree of completeness of each script, and linear regression computed using the number of activities included as the predictor variable. This research provides the first evidence of the limits of creating scripts using an intuitive approach, and the need for applying semi-structured goal-based methods.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information? 分析人员如何思考:犯罪情报分析人员如何识别和管理重要信息?
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-11 DOI: 10.1109/EISIC.2017.15
C. Groenewald, B. Wong, S. Attfield, P. Passmore, N. Kodagoda
{"title":"How Analysts Think: How Do Criminal Intelligence Analysts Recognise and Manage Significant Information?","authors":"C. Groenewald, B. Wong, S. Attfield, P. Passmore, N. Kodagoda","doi":"10.1109/EISIC.2017.15","DOIUrl":"https://doi.org/10.1109/EISIC.2017.15","url":null,"abstract":"The Criminal Intelligence Analyst's role is to create exhibits which are relevant, accurate and unbiased. Exhibits can be used as input to assist decision-making in intelligence-led policing. It may also be used as evidence in a court of law. The aim of this study was to determine how Criminal Intelligence Analysts recognise and manage significant information as a method to determine what is relevant for their attention and for the creation of exhibits. This in turn may provide guidance on how to design and incorporate loose and flexible argumentation schemas into sense-making software. The objective is to be informed on how to design software, which affords Criminal Intelligence Analysts with the ability to effortlessly determine the relevance of information, which subsequently could assist with the process of assessing and defending the quality of exhibits.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Framework for Measuring Imagination in Visual Analytics Systems 视觉分析系统中测量想象力的框架
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-01 DOI: 10.1109/EISIC.2017.31
M. Bedek, A. Nussbaumer, Eva-Catherine Hillemann, D. Albert
{"title":"A Framework for Measuring Imagination in Visual Analytics Systems","authors":"M. Bedek, A. Nussbaumer, Eva-Catherine Hillemann, D. Albert","doi":"10.1109/EISIC.2017.31","DOIUrl":"https://doi.org/10.1109/EISIC.2017.31","url":null,"abstract":"This paper presents a framework for measuring imagination support in criminal analysis systems. Imagination is important for criminal analysts in their everyday work when they have to solve criminal cases. Typically, they are faced with a huge amount of information that is often ill-structured, do not contain all relationships, and are characterised by many uncertainties. In order to draw correct conclusions and to solve cases, analysts need imagination to find out facts from such data, or in other words: to detect the signals out from the noise. This paper describes a general framework for introducing imagination support in criminal analysis systems. The framework consists of two parts, first the operationalisation of imagination, and second, guidelines for an experimental setting of evaluating criminal analysis systems regarding their imagination support. This work is intended to serve as a baseline for future evaluation work of criminal analysis systems.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-01 DOI: 10.1109/EISIC.2017.28
Panos Kostakos, Miika Moilanen, Arttu Niemela, M. Oussalah
{"title":"Catchem: A Browser Plugin for the Panama Papers Using Approximate String Matching","authors":"Panos Kostakos, Miika Moilanen, Arttu Niemela, M. Oussalah","doi":"10.1109/EISIC.2017.28","DOIUrl":"https://doi.org/10.1109/EISIC.2017.28","url":null,"abstract":"The Panama Papers is a collection of 11.5 million leaked records that contain information for more than 214,488 offshore entities. This collection is growing rapidly as more leaked records become available online. In this paper, we present a work in progress on a web browser plugin that detects company names from the Panama Papers and alerts the user by means of unobtrusive visual cues. We matched a random sample of company names from the Public Works and Government Services Canada registry against the Panama Papers using three different string matching techniques. Monge-Elkan is found to provide the best matching results but at increased computational cost. Levenshtein-based approach is found to provide the best tradeoff between matching and computational cost, while Jacquard index like approach is found to be less sensitive to slight textual change.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIP 面向执法机构的突破性说话人识别方法:SIIP
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-01 DOI: 10.1109/EISIC.2017.14
Khaled Khelif, Yann Mombrun, G. Backfried, Farhan Sahito, L. Scarpato, P. Motlícek, S. Madikeri, Damien Kelly, Gideon Hazzani, Emmanouil Chatzigavriil
{"title":"Towards a Breakthrough Speaker Identification Approach for Law Enforcement Agencies: SIIP","authors":"Khaled Khelif, Yann Mombrun, G. Backfried, Farhan Sahito, L. Scarpato, P. Motlícek, S. Madikeri, Damien Kelly, Gideon Hazzani, Emmanouil Chatzigavriil","doi":"10.1109/EISIC.2017.14","DOIUrl":"https://doi.org/10.1109/EISIC.2017.14","url":null,"abstract":"This paper describes SIIP (Speaker Identification Integrated Project) a high performance innovative and sustainable Speaker Identification (SID) solution, running over large voice samples database. The solution is based on development, integration and fusion of a series of speech analytic algorithms which includes speaker model recognition, gender identification, age identification, language and accent identification, keyword and taxonomy spotting. A full integrated system is proposed ensuring multisource data management, advanced voice analysis, information sharing and efficient and consistent man-machine interactions.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114494182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: A Pilot Study 如何使用道德敏感信息帮助识别共犯通过一个有目的的隐私量表:一项试点研究
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-01 DOI: 10.1109/EISIC.2017.35
Pragya Paudyal, C. Rooney, N. Kodagoda, B. Wong, P. Duquenoy, Nadeem Qazi
{"title":"How the Use of Ethically Sensitive Information Helps to Identify Co-Offenders via a Purposed Privacy Scale: A Pilot Study","authors":"Pragya Paudyal, C. Rooney, N. Kodagoda, B. Wong, P. Duquenoy, Nadeem Qazi","doi":"10.1109/EISIC.2017.35","DOIUrl":"https://doi.org/10.1109/EISIC.2017.35","url":null,"abstract":"Police analysts increasingly use data analysis techniques to make decisions that have an impact on society. Previous research shows that excluding ethically sensitive information (features) such as name, surname, address etc. during the data analysis process has implications for accuracy and decision-making, which may have negative consequences affecting individuals or a group within society. To assess whether the use of ethically sensitive features has implications for decision-making, we identified two important aspects: (i) transparency of the feature selection, and (ii) a way of assessing the impact of the selected features. In this paper, we define ethically sensitive information from two aspects: (a) features that identify an individual, known as personally identifiable information, and (b) sensitive features that discriminate against the individual, known as prejudice information. We investigate whether the selection of these features has an impact on accurately identifying co-offenders. For this, we propose a privacy scale, which consists of a value for each feature depending on the label of their sensitivity. To explore this, we used an anonymized dataset received from a UK law enforcement agency. Ground truths samples with known co-offender were selected for this study. We used the clustering algorithm K-MODE and included and excluded features that included personal, prejudice and other attributes to assess the relationship between the privacy score of the combined input attributes and the accuracy of the clustering. The results suggest that the use of ethically sensitive features does have an impact on correctly identifying potential co-offenders more accurately.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Inconvenient Truth: Algorithmic Transparency & Accountability in Criminal Intelligence Profiling 一个难以忽视的真相:刑事情报分析中的算法透明度和问责制
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-01 DOI: 10.1109/EISIC.2017.12
Erik T. Zouave, Thomas Marquenie
{"title":"An Inconvenient Truth: Algorithmic Transparency & Accountability in Criminal Intelligence Profiling","authors":"Erik T. Zouave, Thomas Marquenie","doi":"10.1109/EISIC.2017.12","DOIUrl":"https://doi.org/10.1109/EISIC.2017.12","url":null,"abstract":"In the hopes of making law enforcement more effective and efficient, police and intelligence analysts are increasingly relying on algorithms underpinning technologybased and data-driven policing. To achieve these objectives, algorithms must also be accurate, unbiased and just. In this paper, we examine how European data protection law regulates automated profiling and how this regulation impacts police and intelligence algorithms and algorithmic discrimination. In particular, we assess to what extent the regulatory frameworks address the challenges of algorithmic transparency and accountability. We argue that while the law regulates both algorithms and their discriminatory effects, the framework is insufficient in addressing the complex interactions that must take place between system developers, users, oversight and profiled individuals to fully guarantee algorithmic transparency and accountability.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124197199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence 网络威胁情报模型:网络威胁情报中的分类、共享标准和本体论的评估
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-01 DOI: 10.1109/EISIC.2017.20
Vasileios Mavroeidis, Siri Bromander
{"title":"Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence","authors":"Vasileios Mavroeidis, Siri Bromander","doi":"10.1109/EISIC.2017.20","DOIUrl":"https://doi.org/10.1109/EISIC.2017.20","url":null,"abstract":"Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security operations in terms of detective and preventive capabilities. Successful threat intelligence within the cyber domain demands a knowledge base of threat information and an expressive way to represent this knowledge. This purpose is served by the use of taxonomies, sharing standards, and ontologies.This paper introduces the Cyber Threat Intelligence (CTI) model, which enables cyber defenders to explore their threat intelligence capabilities and understand their position against the ever-changing cyber threat landscape. In addition, we use our model to analyze and evaluate several existing taxonomies, sharing standards, and ontologies relevant to cyber threat intelligence. Our results show that the cyber security community lacks an ontology covering the complete spectrum of threat intelligence. To conclude, we argue the importance of developing a multi-layered cyber threat intelligence ontology based on the CTI model and the steps should be taken under consideration, which are the foundation of our future work.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
Can an Automatic Tool Assess Risk of Radicalization Online? A Case Study on Facebook 自动工具能评估在线激进化风险吗?以Facebook为例
2017 European Intelligence and Security Informatics Conference (EISIC) Pub Date : 2017-09-01 DOI: 10.1109/EISIC.2017.36
J. Torregrosa, Irene Gilpérez-López, R. Lara-Cabrera, David Garriga, David Camacho
{"title":"Can an Automatic Tool Assess Risk of Radicalization Online? A Case Study on Facebook","authors":"J. Torregrosa, Irene Gilpérez-López, R. Lara-Cabrera, David Garriga, David Camacho","doi":"10.1109/EISIC.2017.36","DOIUrl":"https://doi.org/10.1109/EISIC.2017.36","url":null,"abstract":"Can risk of radicalization be measured analyzing users' information on the Internet? Following the background from recent studies [1], [2], [3], [4], this work aims to test the viability of detecting and measuring risk factors of jihadist radicalization with a Facebook case. The work has been performed under the frame of RiskTrack project, which aim is to develop an automatic risk assessment tool for jihadist radicalization, using data from online social networks profiles.","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134074679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信