4,331 research outputs found

    Intelligence and Security Informatics

    Get PDF
    The book constitutes the proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008 Intelligence and security informatics (ISI) is a multidisciplinary field encompassing methodologies, models, algorithms, and advanced tools for intelligence analysis, homeland security, terrorism research as well as security-related public policies. These proceedings contain 25 original papers, out of 48 submissions received, related to the topics of intelligence and security informatics. These papers cover a broad range of fields such as: social network analysis, knowledge discovery, web-based intelligence and analysis, privacy protection, access control, digital rights management, malware and intrusion detection, surveillance, crisis management, and computational intelligence, among others.JRC.G.2-Support to external securit

    Intelligent information retrieval tools for police. Intelligence and security informatics. Proceedings.

    Get PDF
    Intelligent information retrieval tools can help intelligence and security agencies to retrieve and exploit relevant information from unstructured information sources and give them insight into the criminal behavior and networks, in order to fight crime more efficiently and effectively. This article aims at analysing off-the-shelf information extraction tools on their applicability and competency for such applications.

    A Non-Parametric Learning Approach to Identify Online Human Trafficking

    Full text link
    Human trafficking is among the most challenging law enforcement problems which demands persistent fight against from all over the globe. In this study, we leverage readily available data from the website "Backpage"-- used for classified advertisement-- to discern potential patterns of human trafficking activities which manifest online and identify most likely trafficking related advertisements. Due to the lack of ground truth, we rely on two human analysts --one human trafficking victim survivor and one from law enforcement, for hand-labeling the small portion of the crawled data. We then present a semi-supervised learning approach that is trained on the available labeled and unlabeled data and evaluated on unseen data with further verification of experts.Comment: Accepted in IEEE Intelligence and Security Informatics 2016 Conference (ISI 2016

    Human Security Informatics, Global Grand Challenges and Digital Curation

    Get PDF
    This paper argues that addressing humanitarian issues and concerns about social and societal inequities that are integral to many societal grand challenges needs to become a concerted and sustained focus of digital curation. It proposes a new framing emanating out of the archival and record-keeping community – Human Security Informatics (HSI) – for human and humanitarian-centered rather than data, artifact or research-centered digital curation research and development. Human security is proposed as a new concept that promotes the protection and advancement of individuals and communities. It prioritizes individual agency and rights, and human-centered and multidisciplinary approaches that support democratization, transparency and accountability in trans- and supra-national governance and policy-making. Within this ethos, HSI specifically targets data, documentary, record-keeping and other accountability and evidentiary components of societal grand challenges. In so doing it necessarily highlights curation grand challenges, and demands the reorientation of some fundamental assumptions of digital curation relating to technological, economic and policy infrastructure priorities and standards, trust, scale, universality and content-centricity. To illustrate its argument, two research endeavors are discussed. The first is an Archival Education and Research Initiative (AERI) study that analyzed six areas of societal grand challenges and identified key, and often overlooked, areas where HSI could and should contribute. The analysis also surfaced grand challenges facing the digital curation community itself, many with particular applicability to digital curation capacity, processes and priorities in bureaucratic archives. The second is the Refugee Rights in Records (R3) Project, an example of wide-ranging HSI research that is focused on data, social media content and record-keeping, as well as on individual human rights in and to records and documentation. In both examples the paper identifies several specific areas of relevance to digital curation where an HSI approach would be appropriate

    Solutions to Detect and Analyze Online Radicalization : A Survey

    Full text link
    Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber- Hate) is widespread and has become a major and growing concern to the society, governments and law enforcement agencies around the world. Research shows that various platforms on the Internet (low barrier to publish content, allows anonymity, provides exposure to millions of users and a potential of a very quick and widespread diffusion of message) such as YouTube (a popular video sharing website), Twitter (an online micro-blogging service), Facebook (a popular social networking website), online discussion forums and blogosphere are being misused for malicious intent. Such platforms are being used to form hate groups, racist communities, spread extremist agenda, incite anger or violence, promote radicalization, recruit members and create virtual organi- zations and communities. Automatic detection of online radicalization is a technically challenging problem because of the vast amount of the data, unstructured and noisy user-generated content, dynamically changing content and adversary behavior. There are several solutions proposed in the literature aiming to combat and counter cyber-hate and cyber-extremism. In this survey, we review solutions to detect and analyze online radicalization. We review 40 papers published at 12 venues from June 2003 to November 2011. We present a novel classification scheme to classify these papers. We analyze these techniques, perform trend analysis, discuss limitations of existing techniques and find out research gaps
    • …
    corecore