83 research outputs found
The insider on the outside: a novel system for the detection of information leakers in social networks
Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles
Relazioni diplomatiche tra la Repubblica di Ragusa e l’Impero del Marocco. La missione Casilari (1779-1780)
This article focuses on the diplomatic mission of the Ragusean captain Casilari, to free the crew of a Ragusean ship captured by the Moroccan pirates. Through the relations between Ragusa and the empire of Morocco, the paper deals with an episode of the endemic piracy in the Mediterranean, but it also sheds light on the importance of the Ragusean consular network which provided vital information for the success of the mission
Data Security Awareness: metodi e strumenti per promuoverla nella scuola secondaria. Il caso del progetto Edu4Sec.
Il contributo presenta la cornice teorica e metodologica e l\u2019articolazione del
progetto Edu4Sec \u2013 Effective Education for Improving Data Security Awareness
attivato nel 2016 presso l\u2019Universit\ue0 di Padova con l\u2019obiettivo di promuovere,
negli studenti delle scuole secondarie di secondo grado, consapevolezza circa i
rischi che si possono correre in rete ed i comportamenti pi\uf9 efficaci per prevenire
e far fronte a tali rischi
Counter-terrorism in cyber-physical spaces: Best practices and technologies from the state of the art
Context: The demand for protection and security of physical spaces and urban
areas increased with the escalation of terroristic attacks in recent years. We
envision with the proposed cyber-physical systems and spaces, a city that would
indeed become a smarter urbanistic object, proactively providing alerts and
being protective against any threat. Objectives: This survey intend to provide
a systematic multivocal literature survey comprised of an updated,
comprehensive and timely overview of state of the art in counter-terrorism
cyber-physical systems, hence aimed at the protection of cyber-physical spaces.
Hence, provide guidelines to law enforcement agencies and practitioners
providing a description of technologies and best practices for the protection
of public spaces. Methods: We analyzed 112 papers collected from different
online sources, both from the academic field and from websites and blogs
ranging from 2004 till mid-2022. Results: a) There is no one single
bullet-proof solution available for the protection of public spaces. b) From
our analysis we found three major active fields for the protection of public
spaces: Information Technologies, Architectural approaches, Organizational
field. c) While the academic suggest best practices and methodologies for the
protection of urban areas, the market did not provide any type of
implementation of such suggested approaches, which shows a lack of
fertilization between academia and industry. Conclusion: The overall analysis
has led us to state that there is no one single solution available, conversely,
multiple methods and techniques can be put in place to guarantee safety and
security in public spaces. The techniques range from architectural design to
rethink the design of public spaces keeping security into account in
continuity, to emerging technologies such as AI and predictive surveillance
Real-world K-Anonymity applications:The KGEN approach and its evaluation in fraudulent transactions
K-Anonymity is a property for the measurement, management, and governance of the data anonymization. Many implementations of k-anonymity have been described in state of the art, but most of them are not practically usable over a large number of attributes in a “Big” dataset, i.e., a dataset drawing from Big Data. To address this significant shortcoming, we introduce and evaluate KGEN, an approach to K-anonymity featuring meta-heuristics, specifically, Genetic Algorithms to compute a permutation of the dataset which is both K-anonymized and still usable for further processing, e.g., for private-by-design analytics. KGEN promotes such a meta-heuristic approach since it can solve the problem by finding a pseudo-optimal solution in a reasonable time over a considerable load of input. KGEN allows the data manager to guarantee a high anonymity level while preserving the usability and preventing loss of information entropy over the data. Differently from other approaches that provide optimal global solutions compatible with smaller datasets, KGEN works properly also over Big datasets while still providing a good-enough K-anonymized but still processable dataset. Evaluation results show how our approach can still work efficiently on a real world dataset, provided by Dutch Tax Authority, with 47 attributes (i.e., the columns of the dataset to be anonymized) and over 1.5K+ observations (i.e., the rows of that dataset), as well as on a dataset with 97 attributes and over 3942 observations.</p
Counter-terrorism in cyber–physical spaces:Best practices and technologies from the state of the art
Context: The demand for protection and security of physical spaces and urban areas increased with the escalation of terroristic attacks in recent years. We envision with the proposed cyber–physical systems and spaces, a city that would indeed become a smarter urbanistic object, proactively providing alerts and being protective against any threat. Objectives: This survey intend to provide a systematic multivocal literature survey comprised of an updated, comprehensive and timely overview of state of the art in counter-terrorism cyber–physical systems, hence aimed at the protection of cyber–physical spaces. Hence, provide guidelines to law enforcement agencies and practitioners providing a description of technologies and best practices for the protection of public spaces. Methods: We analyzed 112 papers collected from different online sources, both from the academic field and from websites and blogs ranging from 2004 till mid-2022. Results: (a) There is no one single bullet-proof solution available for the protection of public spaces. (b) From our analysis we found three major active fields for the protection of public spaces: Information Technologies, Architectural approaches, Organizational field. (c) While the academic suggest best practices and methodologies for the protection of urban areas, the market did not provide any type of implementation of such suggested approaches, which shows a lack of fertilization between academia and industry. Conclusion: The overall analysis has led us to state that there is no one single solution available, conversely, multiple methods and techniques can be put in place to guarantee safety and security in public spaces. The techniques range from architectural design to rethink the design of public spaces keeping security into account in continuity, to emerging technologies such as AI and predictive surveillance.</p
Internet-of-Things Architectures for Secure Cyber-Physical Spaces: the VISOR Experience Report
Internet of things (IoT) technologies are becoming a more and more widespread
part of civilian life in common urban spaces, which are rapidly turning into
cyber-physical spaces. Simultaneously, the fear of terrorism and crime in such
public spaces is ever-increasing. Due to the resulting increased demand for
security, video-based IoT surveillance systems have become an important area
for research. Considering the large number of devices involved in the illicit
recognition task, we conducted a field study in a Dutch Easter music festival
in a national interest project called VISOR to select the most appropriate
device configuration in terms of performance and results. We iteratively
architected solutions for the security of cyber-physical spaces using IoT
devices. We tested the performance of multiple federated devices encompassing
drones, closed-circuit television, smart phone cameras, and smart glasses to
detect real-case scenarios of potentially malicious activities such as
mosh-pits and pick-pocketing. Our results pave the way to select optimal IoT
architecture configurations -- i.e., a mix of CCTV, drones, smart glasses, and
camera phones in our case -- to make safer cyber-physical spaces' a reality
- …