Development of information technology is one of the most dynamic parts of today's global society. Along with the coming of new technologies it generates new types of crime, eventually existing types of criminal activities in this area are moving from the real world to cyberspace. This rapid development of cyber crime enforces corresponding changes in the legislation related to cyberspace. In the Czech Republic the most fundamental changes in cyber crime law have been made along with the new C...
Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.
Conley-Ware, Lakita D.
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Florence Tushabe; Venansius Baryamureeba
There is a general feeling that Internet crime is an advanced type of crime that has not yet infiltrated developing countries like Uganda. The carefree nature of the Internet in which anybody publishes anything at anytime poses a serious security threat for any nation. Unfortunately, there are no formal records about this type of crime for Uganda. Could this mean that it does not exist there? The author conducted an independent research to ascertain whether cyber crimes h...
Mehan, Julie E
CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today’s corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response.
Cyber crime is a worldwide problem, with a global reach. Cyber crimes do not respect national boundaries, and so can be sent to and from anywhere in the world. Many reports, mostly by cyber security firms, regularly release information ranking the different nations in terms of top cyber crime output, broken down into varying cyber crime types. However, little has been done to classify nations according to separate cyber crime typologies using any multivariate methods. Instead, reporting is de...
Ayesha Al Neyadi
Full Text Available Abstract Most people in UAE dont feel safe while they are use the Internet because most internet users have been a victim for cyber crime. Cyber crime threat rate has increased which has targeted on citizen privacy property and governments also the reputation problems. There are many criminal activities such as indecent acts Copyright issues Terrorist Acts State security and Contempt of religion. Cyber crimes due to several reasons such as they have lack of social intelligence they are being greedy and not being content also some of them have financial troubles these reasons usually exploited by criminals. Thus the decree will be a punishment or criminalizes formally on any person who using any kind of information technology and any others private life to blackmail or to threaten others online. In addition at the present time with the most detailed new cybercrime law that can be used to prove found guilty. As well the author discusses that the new cyber-crime law provides protection of personal information including banking information credit cards and electronic payment information.
Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,
Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empi...
Ackoski, Jugoslav; Dojcinovski, Metodija
This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...
Full Text Available During the past years, the Internet has evolved into the so-called “Web 2.0”. Nevertheless, the wide use of the offered Internet services has rendered individual users a potential target to cyber criminals. The paper presents a review and analysis of various cyber crimes, based on the cases that were reported to the Cyber Crime and Computer Crime Unit of the Greek Police Force and compares them to similar data of other EU countries.
Karl H. Stingeder
Welche Rolle spielt Cyber Crime gegenwärtig? Was unterscheidet Cyber Crime von Cyber War? Wie muss Cyber Security gestaltet sein, um effektiven Schutz nachhaltig zu gewährleisten? Cyber Crime-Aktivitäten kennzeichnen sich häufig durch eine einfache Zugänglichkeit von betrügerischem Know-How und technischen Hilfsmitteln. Bedingt durch eine schleppende und mangelhafte Umsetzung von koordinierten Gegenmaßnahmen, resultieren Cyber-Delikte in einem Low-Risk und High-Reward Szenario für Cyber-Krimi...
Karl H. Stingeder
Full Text Available Welche Rolle spielt Cyber Crime gegenwärtig? Was unterscheidet Cyber Crime von Cyber War? Wie muss Cyber Security gestaltet sein, um effektiven Schutz nachhaltig zu gewährleisten? Cyber Crime-Aktivitäten kennzeichnen sich häufig durch eine einfache Zugänglichkeit von betrügerischem Know-How und technischen Hilfsmitteln. Bedingt durch eine schleppende und mangelhafte Umsetzung von koordinierten Gegenmaßnahmen, resultieren Cyber-Delikte in einem Low-Risk und High-Reward Szenario für Cyber-Kriminelle. Je organisierter und spezialisierter ein Cyber-Crime-Netzwerk gestaltet ist, desto größer wird das Schadenspotenzial. Cyber Crime ist der Überbegriff für betrügerische Aktivitäten über das Internet. Diese stützen sich auf das Vorbild von "traditionellen" Offline-Kriminalitätsverhaltensmustern, welche durch das technologische Spektrum des Internets einfach zugänglich sind. Nichtsdestoweniger ist es die technische Ausführung der Delikte, die ein wesentliches Unterscheidungsmerkmal zwischen Online- und Offline-Betrug bildet. Auch steht die für organisierte, kriminelle Verbindungen, so auch für Regierungen oder Terrororganisationen geringere Hemmschwelle für eine militärische Instrumentalisierung des Internets im Brennpunkt von Cyber Security. Erfolgen Cyber Crime Aktivitäten unter dem Anspruch der Verfolgung politischer Ziele, sprechen wir von Cyber War. Nachhaltige, gegen Cyber Crime und Cyber War gerichtete Cyber Security-Maßnahmen finden in einem hochdynamischen Umfeld statt. Cyber-Kriminelle sind im Regelfall logistisch und finanziell gut ausgestattet. Viele werden von Regierungen unterstützt. Cyber Crime-Player verfügen über weitreichende technische Fähigkeiten, sodass sie maßgeschneiderte Schadprogramme (Malware für ihre Ziele entwickeln können. Aktuell fehlt vielen Unternehmen und öffentlichen Institutionen das Bewusstsein für die Notwendigkeit von Abwehrsystemen. Ein Cyber Security-Fokus auf Pr
Full Text Available One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on the data warehouse. We discuss several ways of utilizing the data warehouse using OLAP and data mining technologies. We finally discuss legal issues and data population issues for the data warehouse.
deal with making the civil community aware of Cyber Crime and provide a defense mechanism to assist governments from developing countries to prevent their countries to be used as targets or intermediary for either Cyber Crime or Cyber Warfare.
Drucker, Susan J.; Gumpert, Gary
Surveys ways in which criminal laws are finding their way into cyberspace, the implications of such actions for communicative rights and liabilities, and the media differentials of crime and punishment. Examines crime committed using email and the Internet; computer mediated felonies, misdemeanors, and violations committed in cyberspace; forgery;…
Mohammad Rasmi; Ahmad Al Qerem
Nowadays, cyber crimes are increasing and have affected large organizations with highly sensitive information. Consequently, the affected organizations spent more resources analyzing the cyber crimes rather than detecting and preventing these crimes. Network forensics plays an important role in investigating cyber crimes; it helps organizations resolve cyber crimes as soon as possible without incurring a significant loss. This paper proposes a new approach to analyze cyber crime evidence. The...
Full Text Available of the crime, the facilitator of the crime, or the target of the crime” . The intense increase in cyber space crime is due to severe shortcomings of both local and international legislation, and the innovative ideas that criminals have with regard... countries made an attempt to minimize or control cyber crime . Very few legal systems presently consider the digital world. Current criminal and penal laws need to be modified, edited or amended to fit the requirements of the cyber world...
A sample of 500 students randomly selected from cyber café in Esan west local government area of Edo state was used. The instrument for data collection is the Student Perception of Cyber Crime (S.P.C.C.) it comprises of 20 items. The reliability of the instrument was obtained using the split-half method and the coefficient ...
Full Text Available Cyber crime is a phenomenon which is often written and spoken about, ever since its inception, in theory, judicial and legislative practice of developed countries and international institutions. It had rapidly developed in the last decade of the 20th century, and in the 21st century its evolution has become even more evident. Countries have responded by introducing new measures in their criminal legislation, in an effort to reconcile traditional criminal law with the demands for perception, investigation and demonstration of new criminal acts. This paper presents and analyzes the most significant European standards adopted in order to create more effective national legislation in the field of combating cyber crime. Standards given in the Convention of the Council of Europe but also the European Union Directives have to a large extent been a guide for national legislations in order to regulate the new situations regarding the misuse of information and communication technologies in the most adequate manner. Among other things, this paper pays special attention to the most important Convention in the field of combating cyber crime, which is the Council of Europe Convention on cyber crime, whose objectives include: harmonization of national legislations with regard to substantive provisions in the field of cyber crime, introduction of adequate instruments in national legislations with regard to process provisions in order to create the necessary basis for investigation and prosecution of offenders in this field and establishment of quick and efficient institutions and procedures for international cooperation.
Bergmann, Marie Christine; Dreißigacker, Arne; von Skarczinski, Bennet; Wollinger, Gina Rosa
The Internet has simplified daily life activities. However, besides its comfortability, the Internet also presents the risk of victimization by several kinds of crimes. The present article addresses the question of which factors influence cyber-dependent crime and how they vary between three kinds of cyber-dependent offences: malware infection, ransomware infection, and misuse of personal data. According to the Routine Activity Approach, it is assumed that crime is determined by a motivated offender, the behavior of the Internet user, and the existence of prevention factors. Our analyses were based on a random sample of 26,665 Internet users in two federal states in Germany, aged 16 years and older; 16.6 percent of the respondents had experienced at least one form of cyber-dependent victimization during the year 2014. The results indicate that individual and household factors, as well as online and prevention behavior, influence the risk of cyber-dependent victimization. Furthermore, the effects differ between the three types of offences. In conclusion, the risk of being victimized by cyber-dependent crime is not the same for anyone, but depends on multivariate factors according to the idea of Routine Activity Approach. However, in view of the fact that crime-related factors also matter, studying different cybercrime offences separately seems to be an appropriate research approach.
M. Naufal, M.; Jannah, H Sofwan
This articlewillexplainaboutcybercrime, effortsto overcome, focus, punishment andthe viewof Islami claw and positive law against cyber crime behavior. Cyber Crimeis a criminal activity Islami claw and positive law against cyber crime behavior. Cyber Crimeis a criminal activity using computer facilitiesor computer network without permission and against the law. According using computer facilitiesor computer network without permission and against the law. According toIslamic shar...
Full Text Available The article analyses the problems that appear in the process of protecting the educational institutions from the security risks in cyber space - cyber crime and cyberbullying. Due to main characteristics and nature of security risks in cyber space, children, adolescents and students are particularly vulnerable category of Internet users. Having this on mind, we can conclude that educational institutions are an important factor in the process of prevention and control of security risks that young people face in cyber space. The authors analyze the legal framework and the actual situation in this domain and propose concrete measures for the reduction of security risks in cyber space, and consider the capacities and importance of building and implementing the unique, functional and pragmatic multi-layer protection model. The first part of the article is dedicated to the analyses of the legal framework for countering cyber crime, with the consideration of the normative legal acts that regulate the protection of children and students from the violence, malestation and neglection in the school environment. The authors also focus on the legal definition of cyberbullying. In the second part of the article, the authors propose the principles and elements for building a model of multi-layer protection and analyze the possibility of its application in educational institutions in the Republic of Serbia, as an efficient tool for the prevention and reduction of security risks in the cyber space.
Full Text Available of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations... revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa...
... of the associated snags which have hindered in no small measure the wide application of IT. This paper reviews the different forms of crime perpetrated through IT, the effects on e-banking and the possible solutions for a wider acceptability. Keywords: cyber-crime, cyber-terrorism, cyber-extortion, public key infrastructure, ...
Putra, Prima Agusdani
Di dalam dunia perbankan perkembangan cyber crime cukup mengejutkan dengan terjadi beberapa kasus yang merugikan pihak perbankan seperti; kasus pembobolan BNI New York oleh mantan karyawannya sendiri, mutasi kredit fiktif melalui komputer di BDN Cabang Bintaro Jaya, pencurian dana di Bank Danamon Pusat. Sementara itu sejumlah nasabah pemegang credit card juga mengeluh, karena nomor kartu kreditnya telah dipakai pihak lain untuk melakukan transaksi e-commerce sehingga menimbu...
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Full Text Available Certain aspects of cyber crime represent the essence of the problems that authorities prosecuting crimes committed by abuse of information technology face everyday. All these specific features of cyber crime must be taken into consideration in order to understand and overcome difficulties in investigation and prosecution of crimes and trial of perpetrators. Given all the above and in order to respond to the specific nature of criminal activities committed using computer networks and systems, it is understandable that countries strive to adapt or complement the existing criminal law provisions. To create an appropriate legal framework for fighting this type of crime by means of criminal law, rules of substantive criminal law should incriminate certain behaviors and predict offenses against the confidentiality, integrity and availability of computer data and computer systems and rules of criminal procedure law should determine the appropriate powers of the authorities in order to identify sources of illicit actions and collect information on the committed offense and the offender which could be used as evidence in criminal proceedings.
The forms of cyber crime in banking are typo site, keylogger / keystroke recorder, sniffing, brute-force attacking, deface web, email spamming, denial of service and virus, worm, trojan. Jurisdiction in the law enforcement against cyber crime in banking jurisdiction includes legislative, executive and enforcement jurisdiction. Jurisdiction specifically stipulated in Article 2 of Act of Republic of Indonesia Number 11 of 2008 concerning Information and Electronic Transactions. Banks should have an electronic security system to protect the system. The Law enforcement against cyber crime in banking requires cooperation between countries.
Full Text Available In the paper the author proposes that effectively and efficiently addressing cyber crime requires a shift in paradigm. For businesses and government departments alike the focus should be on prevention, rather than the prosecution of cyber criminals. The Defence in Depth strategy poses a practical solution for achieving Information Assurance in todayâ€™s highly networked environments. In a world where â€œabsolute securityâ€ is an unachievable goal, the concept of Information Assurance poses significant benefits to securing one of an organizationâ€™s most valuable assets: Information. It will be argued that the approach of achieving Information Assurance within an organisation, coupled with the implementation of a Defence in Depth strategy can ensure that information is kept secure and readily available and provides a competitive advantage to those willing to invest and maintain such a strategy.
Monica Lagazio; Nazneen Sherif; Mike Cushman
This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible and intangible factors, affect cyber crime cost and occur at different levels of society and value network. Specifically, shifts in financial companies’ strategic priorities, having the protection of customer trust and loyalty as a key objective, ...
Dilek, Selma; Çakır, Hüseyin; Aydın, Mustafa
With the advances in information technology (IT) criminals are using cyberspace to commit numerous cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices and human intervention are not sufficient for monitoring and protection of these infrastructures; hence, there is a need for more sophisticated cyber defense systems that need to be flexible, adaptable and robust, and able to detect a wide variety of threats and make intelligent real-time ...
Full Text Available Warfare with International Cyber Collaboration for RSA ? Preparing Communities Dr Marthie Grobler, Joey Jansen van Vuuren', Dr Jannie Zaaiman? Council for Scientific and Industrial Research, Pretoria, South Africa1 University of Venda2 ABSTRACT... with the technological revolution is that cyberspace is full of complex and dynamic technological innovations that are not well suited to any legal system. A further complication is the lack of comprehensive treaties facilitating international cooperation...
Full Text Available Based on a written survey, this paper examines the current trends in internet use and cyber crime against youth for a given set of demographic conditions and presents suggestions for related safety measures and precautions. A written survey of young internet users aged between 10 and 17 years was conducted in the schools of Chandigarh, India. It showed that nearly 84 percent of the youth surveyed have internet connectivity at their homes. Seventy percent of the youth surveyed use the internet for social networking, the majority of whom share photographs, videos and personal information online. Fifteen percent of the youth reported online harassment, and approximately 30 percent reported online interaction with unknown people. According to the youth surveyed, the parents or guardians of more than 90 percent know about their browsing habits. In most cases parents or guardians had talked to their children about internet safety and possible threats. Schools and parents/guardians should ensure that the children are aware of internet dangers, including the dangers of sharing personal information and trusting unknown people online, and regulate their browsing activities.
Full Text Available Der vorliegende Kommentar bezieht sich auf den Beitrag „Cyber Crime – der digitalisierte Täter“ von Susanne Reindl-Krauskopf (ALJ 2/2017, 110. Die Computerkriminalität ist aktuell wohl eines der am schnellsten wachsenden, aber auch unterschätztesten Kriminalitätsfelder und damit bereits zu einem massiven faktischen Problem in der Gesellschaft geworden. Allein im Jahr 2016 gab es in Österreich 13.103 Anzeigen wegen Cybercrime-Delikten. Obwohl Cybercrime-Phänomene in allen Lebensbereichen zunehmen, sind sie noch nicht wirklich in der Rechtsprechung angekommen, was die äußerst wenigen Verurteilungszahlen bestätigen. Dies beruht auf folgenden Gründen: Faktische Probleme der Täterausforschung in der informationstechnischen Umgebung, strafprozessuale Schwierigkeiten hinsichtlich IT-spezifischer Ermittlungsmaßnahmen insb bei Auslandsbezug und nicht zuletzt konzeptionell verbesserungsfähige Computerdelikte. Die der Computerkriminalität zugrundeliegenden informationstechnischen Konzepte machen sie sehr facettenreich, weshalb die im Hauptvortrag von Reindl-Krauskopf diskutierten Phänomene lediglich eine kleine Auswahl an Erscheinungsformen der Computerkriminalität darstellen. In meinem Kommentar zu diesen Beispielsfällen, werde ich einige neue Herausforderungen für das Strafrecht dogmatisch sowie rechtspolitisch näher beleuchten.
Full Text Available ABSTRACTInternet has been used in various fields of life, one of which is banking. Banking activities are performed through Internet-banking. Through the internet-banking service, customers can conduct financial transactions without having to come to the bank. In this study addressed two issues namely the forms of cyber crime in the banking and jurisdiction in the law enforcement against cyber crime in banking. This research is a normative legal research. Legal materials collected through library research. In this research, legal materials were analyzed by using the description, interpretation, argumentation, evaluation and systematization.The forms of cyber crime in banking are typo site, keylogger / keystroke recorder, sniffing, brute-force attacking, deface web, email spamming, denial of service and virus, worm, trojan. Jurisdiction in the law enforcement against cyber crime in banking jurisdiction includes legislative, executive and enforcement jurisdiction. Jurisdiction specifically stipulated in Article 2 of Act of Republic of Indonesia Number 11 of 2008 concerning Information and Electronic Transactions. Banks should have an electronic security system to protect the system. The Law enforcement against cyber crime in banking requires cooperation between countries.
Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-risk related domains, both from a civilian and a military perspective. Explaining fundamental principles in an interdisciplinary manner, it sheds light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies.
Full Text Available The problem of the objects identification on the base of their hyperspectral features has been considered. It is offered to use the SVM classifiers on the base of the modified PSO algorithm, adapted to specifics of the problem of the objects identification on the base of their hyperspectral features. The results of the objects identification on the base of their hyperspectral features with using of the SVM classifiers have been presented.
DeVoe, Jill; Murphy, Christina
These Web Tables use data from the 2007 School Crime Supplement (SCS) to the National Crime Victimization Survey (NCVS) to show the relationship between bullying and cyber-bullying victimization and other variables of interest such as the reported presence of gangs, guns, drugs, and alcohol at school; select school security measures; student…
Lessne, Deborah; Harmalkar, Sayali
This document reports data from the 2011 School Crime Supplement (SCS) of the National Crime Victimization Survey (NCVS). The Web Tables show the extent to which students with different personal characteristics report bullying and cyber-bullying. Estimates include responses by student characteristics: student sex, race/ethnicity, grade, and…
Advancements in information and communication technologies (ICT) inextricably bring new threats to the end-users and society. However, the last 40 years have shown that many of the same cyber security design and programming failures occur over and over again when a new ICT innovation and development
Vande Putte, Danny; Verhelst, Marc
Risk management has never been easy. Finding efficient mitigating measures is not always straightforward. Finding measures for cyber crime, however, is a really huge challenge because cyber threats are changing all the time. As the sophistication of these threats is growing, their impact increases. Moreover, society and its economy have become increasingly dependent on information and communication technologies. Standard risk analysis methodologies will help to score the cyber risk and to place it in the risk tolerance matrix. This will allow business continuity managers to figure out if there is still a gap with the maximum tolerable outage for time-critical business processes and if extra business continuity measures are necessary to fill the gap.
Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul
We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.
MSc. Bahri Gashi
Full Text Available Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions. The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in public systems and private sector; creating barriers in distance entry networks and information systems, etc. Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes.
Wu, Gui-Fang; He, Yong
One mixed algorithm was presented to discriminate cashmere varieties with principal component analysis (PCA) and support vector machine (SVM). Cashmere fiber has such characteristics as threadlike, softness, glossiness and high tensile strength. The quality characters and economic value of each breed of cashmere are very different. In order to safeguard the consumer's rights and guarantee the quality of cashmere product, quickly, efficiently and correctly identifying cashmere has significant meaning to the production and transaction of cashmere material. The present research adopts Vis/NIRS spectroscopy diffuse techniques to collect the spectral data of cashmere. The near infrared fingerprint of cashmere was acquired by principal component analysis (PCA), and support vector machine (SVM) methods were used to further identify the cashmere material. The result of PCA indicated that the score map made by the scores of PC1, PC2 and PC3 was used, and 10 principal components (PCs) were selected as the input of support vector machine (SVM) based on the reliabilities of PCs of 99.99%. One hundred cashmere samples were used for calibration and the remaining 75 cashmere samples were used for validation. A one-against-all multi-class SVM model was built, the capabilities of SVM with different kernel function were comparatively analyzed, and the result showed that SVM possessing with the Gaussian kernel function has the best identification capabilities with the accuracy of 100%. This research indicated that the data mining method of PCA-SVM has a good identification effect, and can work as a new method for rapid identification of cashmere material varieties.
Long, Yi; Du, Zhi-Jiang; Wang, Wei-Dong; Zhao, Guang-Yu; Xu, Guo-Qiang; He, Long; Mao, Xi-Wang; Dong, Wei
Locomotion mode identification is essential for the control of a robotic rehabilitation exoskeletons. This paper proposes an online support vector machine (SVM) optimized by particle swarm optimization (PSO) to identify different locomotion modes to realize a smooth and automatic locomotion transition. A PSO algorithm is used to obtain the optimal parameters of SVM for a better overall performance. Signals measured by the foot pressure sensors integrated in the insoles of wearable shoes and the MEMS-based attitude and heading reference systems (AHRS) attached on the shoes and shanks of leg segments are fused together as the input information of SVM. Based on the chosen window whose size is 200 ms (with sampling frequency of 40 Hz), a three-layer wavelet packet analysis (WPA) is used for feature extraction, after which, the kernel principal component analysis (kPCA) is utilized to reduce the dimension of the feature set to reduce computation cost of the SVM. Since the signals are from two types of different sensors, the normalization is conducted to scale the input into the interval of [0, 1]. Five-fold cross validation is adapted to train the classifier, which prevents the classifier over-fitting. Based on the SVM model obtained offline in MATLAB, an online SVM algorithm is constructed for locomotion mode identification. Experiments are performed for different locomotion modes and experimental results show the effectiveness of the proposed algorithm with an accuracy of 96.00% ± 2.45%. To improve its accuracy, majority vote algorithm (MVA) is used for post-processing, with which the identification accuracy is better than 98.35% ± 1.65%. The proposed algorithm can be extended and employed in the field of robotic rehabilitation and assistance.
Michael Raymond Bartolacci
Full Text Available The growth of the Internet has created a corresponding growth in Internet-based crimes and online misbehavior, particularly among younger computer-savvy people who learned the technical skills necessary for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial of Service attack (PDOS. A PDOS is a cyber crime in which an individual deliberately prevents the access of an individual or small group to online services such as email or banking. Due to the nature of a PDOS, these acts can be overlooked by law enforcement and organizations that operate Internet infrastructure such as universities. We analyze a PDOS attack in the context of the Routine Activities Theory of criminal justice. We also surveyed university students to ascertain their attitudes towards online account breaches as related to a PDOS attack. Our motivation for this work is twofold: to stress the need for cyber ethics education at the university level, and to illustrate how a previously uncategorized type of cyber crime is easily perpetrated in such an environment.
Burgess, Ann Wolbert; Mahoney, Meghan; Visk, Julie; Morgenbesser, Leonard
A 2-year review of 285 child cyber crime cases reported in the newspaper revealed how the Internet offenders were apprehended, the content of child pornography, and crime classification. A subsample of 100 cases with data on offender occupation revealed 73% of cases involved people in positions of authority. The dynamics of child cyber crime cases direct the implications for nursing practice in terms of evidence-based suspicion for reporting, categorizing the content of Internet images, referral of children for counseling, and treatment of offenders.
DeVoe, Jill; Murphy, Christina
In school year 2008-09, some 7,066,000 U.S. students ages 12 through 18, or 28.0 percent of all such students, reported they were bullied at school, and about 1,521,000, or 6.0 percent, reported they were cyber-bullied anywhere (i.e., on or off school property). These Web Tables use data from the 2009 School Crime Supplement (SCS) to the National…
Wagner, A. Ben
Many efforts are currently underway to disambiguate author names and assign unique identification numbers so that publications by a given scholar can be reliably grouped together. This paper reviews a number of operational and in-development services. Some systems like ResearcherId.Com depend on self-registration and self-identification of a…
Full Text Available results, delivery methods, risks, and methods to evaluation the initiative. Peltier believes that in order for the cyber security awareness program to be successful, there are five key factors that need to considered and ensured (Peltier, 2005... illustrates the evaluation of cyber security awareness initiatives against the key factors of cyber security awareness programme specified by Peltier (Peltier, 2005). The key factors includes the analysis of cyber crime, identification of target group...
Ana Maria Tuluc
Full Text Available Computer crime, also referred as cyber-crime, is considered today one of the main leadingproblems in the ongoing global economic crisis and an impediment in the development of manycountries. Objectives of this work are: to determine the evolution of cyber-crime during the currenteconomic crisis, to emphasize the severity of this problem and the urgent need to limit its impactworldwide, to determine consumers perceptions regarding this phenomenon in Romania. Prior Workrelated to this issue was conducted by the Computer Security Institute in United States, InternationalComputer Protection Agency, Symantec and Ponemon Institute. In their studies, these institutionshave revealed many of cyber-crime features and proposed valuable solutions for decreasing itsimpact. The Approach used in this paper was a survey among Romanian consumers regarding cybercrime.A total number of 110 respondents participated in this survey. Results showed that almost80% of respondents were victims of cyber-crime at least once and more than 87% of respondentsnever reported these crimes to the police. As regards Implications, the study can offer support tospecialized institutions, while academics can use these findings for further research. The Value of thispaper consists of relevant findings regarding cyber-crime issue in Romania.
Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.
Dr. Hartanto, S.H., M.H.
Full Text Available This research tries to analyze the development of information technology has a positive impact for the community and at the same time have a negative impact. The negative impact of the development of information technology is the emergence of crime to the means of information technology is cyber crime. Cyber crime has a negative impact them is an insult trought electronic media facebook, froud by hacking BBM (Black Berry Messenger, and engineering drawings or photographs in electronic media internet immoral. Why is cyber crime trought facebook, hacking fuel, and engineering drawings or photographs on the internet immoral to have an impact and a very strong influence in the community. Therefore must be dealt with rationally. One is to use the criminal low police approach in the legal protection of information technology users as victims of cybercriminals.
cyber attacks against the U.S. Instead, the DoD employs this active, layered defense-in-depth to CIKR and the GIG and seeks to create an immediate...authorities, is the lead LE agency for investigating subjects who conduct domestic cyber attacks . 53 USCYBERCOM may be able to send attack code to... cyber attacks and reliant on the private sector being responsible for reporting the attacks. The NDAA of Fiscal Year 2013, made great strides with
After having evoked a science-fictional scenario of a cyber attack of a nuclear reactor, but also recent and actual, and sometimes successful cyber attacks against reactor control systems or uranium enrichment centrifuges, this article notices that authorities and bodies in charge of nuclear activities have become aware of this threat only for a short time, and that the threat is increased because of the increasing role of digital compounds in recent reactors. Therefore, a definition of good practices is emerging. In a brief interview, a manager of Assystem outlines that data theft is the main risk
Verma, Ruchi; Razdan, Mayuri; Munshi, Prabhat
Cyber Security, cyber terrorism and cyber crime are the buzzwords in security related aspects of information technology. These terms are related to computers and networks that are critical for normal functionality and operations of nuclear power plants. At one end, this inter connected era is giving us the ease to perform various critical operation with a click of command, but on the other end it is giving rise to the new world of terrorism. In today's internet connected world, terrorism has left all the boundaries back and taken the new form, term it cyber terrorism or cyber crime. This paper aims to spread the awareness about cyber terrorism and how it can affect the overall security of nuclear power plants and establishments. (author)
CIVIL SUPPORT DOD Needs to Clarify Its Roles and Responsibilities for Defense Support of Civil Authorities during...Clarify Its Roles and Responsibilities for Defense Support of Civil Authorities during Cyber Incidents Why GAO Did This Study Cyber threats to U.S...recognizes that the department plays a crucial role in supporting a national effort to confront cyber threats to critical infrastructure. House
Soponyono, Eko; Deva Bernadhi, Brav
Development of national legal systems is aimed to establish the public welfare and the protection of the public. Many attempts has been carried out to renew material criminal law and those efforts results in the formulation of the concept of the draft Law Book of the Law of Criminal Law in the form of concept criminal code draft. The basic ideas in drafting rules and regulation based on the values inside the idology of Pancasila are balance among various norm and rules in society. The design concept of the New Criminal Code Act is anticipatory and proactive to formulate provisions on Crime in Cyberspace and Crime on Information and Electronic Transactions. Several issues compiled in this paper are whether the policy in formulation of cyber crime is embodied in the provisions of the current legislation and what the policies formulation of cyber crime is in the concept of the bill book of law - criminal law recently?.
Ibraeva B. M.
Full Text Available hackers seem to be the most mysterious people in the contemporary world. Where legal actions are helpless, hackers can intervene. However, not only hackers but state employees commit cyber crimes once they get power. Is it just a coincidence or authorities and hackers have lots of things in common? This article is trying to cast light on the reasons why digital crimes are committed.
Full Text Available Today, banks and other financial institutions are one of at the most institutions which are using as an intermediary on black money laundering. Developments in technology have increased some risk factors for financial institutions too. One of these risks is online crime is becoming a more frequent encounters for banks and financial institutions while they are busy with operational processes.The purpose of this study is to identify the points that banks have to prevent the crime of money laundering which results from the misuse of information technologies. Further it was tried to explore the effects of cyber crime and money laundering together.
Computer forensics investigation is relatively new in Nigeria but promises to serve as a watch dog in curbing and checkmating cyber-crimes and ensuring cyber security. This paper aimed at examining the concepts of cyber-crime, cyber security and the implications of computer forensics investigation on cyber security in ...
Jazebi, S.; Vahidi, B.; Jannati, M.
A novel differential protection approach is introduced in the present paper. The proposed scheme is a combination of Support Vector Machine (SVM) and wavelet transform theories. Two common transients such as magnetizing inrush current and internal fault are considered. A new wavelet feature is extracted which reduces the computational cost and enhances the discrimination accuracy of SVM. Particle swarm optimization technique (PSO) has been applied to tune SVM parameters. The suitable performance of this method is demonstrated by simulation of different faults and switching conditions on a power transformer in PSCAD/EMTDC software. The method has the advantages of high accuracy and low computational burden (less than a quarter of a cycle). The other advantage is that the method is not dependent on a specific threshold. Sympathetic and recovery inrush currents also have been simulated and investigated. Results show that the proposed method could remain stable even in noisy environments.
Technologies of information and communication (TICs) are present at all stages of energy production, transport and distribution, and this development is an opportunity for a better resources allocation, but also makes physical infrastructures more vulnerable to cyber-crime. The example of a cyber-attack against Ukrainian utilities in 2015 showed that this threat is an actual one, and the author outlines how energy companies are particularly vulnerable to these threats for cultural, historical and organisational reasons. Some simulations already assessed the huge costs of a cyber-attack against these infrastructures. The author then discusses the perspective and possibilities of development of a cyber-safety in Europe
Technology, particularly IT has brought to mankind a number of features and service delivery channels aimed at offering convenience, enhanced productivity and profitability but not without trade-offs. Crime, fraud and insecurity are some of the associated snags which have hindered in no small measure the wide application ...
Fang, Fang; Zhang, Guifeng; Cheng, Yansheng
Aiming at the problem that the existing detection method can not effectively solve the security of UAV's ultra low altitude flight caused by power line, a power line recognition method based on grid search (GS) and the principal component analysis and support vector machine (PCA-SVM) is proposed. Firstly, the candidate line of Hough transform is reduced by PCA, and the main feature of candidate line is extracted. Then, upport vector machine (SVM is) optimized by grid search method (GS). Finally, using support vector machine classifier optimized parameters to classify the candidate line. MATLAB simulation results show that this method can effectively identify the power line and noise, and has high recognition accuracy and algorithm efficiency.
Montgomery County of Maryland — Updated daily postings on Montgomery County’s open data website, dataMontgomery, provide the public with direct access to crime statistic databases - including raw...
Full Text Available With the advent of internet and digital communication technology, online crimes targeting celebrities have gained a momentum. This article argues that, among the celebrities, actresses of Hollywood and Bollywood are particularly targeted online mainly because of their sex appeal and easy availability of contents including their images, video clippings, their private geo-location information, etc. The perpetrators are mostly fans who may wish to view the actresses as sex symbols. This article suggests that production houses should take primary responsibilities to prevent such victimisation and the actors themselves may avail legal policies such as right to be forgotten to approach the internet companies including search engines like Google to prevent victimisation and remove the offensive contents.
Full Text Available The detection, investigation and prosecution of crimes against the environment has its specificity compared to other forms of crime, because of the nature of these crimes, the manner of execution (modus operandi and the characteristics of their perpetrators. Although there is no objective need for modification of the rules of criminal procedure with regard to these offenses, there is an obvious need for a specialized body of the procedure (prosecutors, judges and authorized officers of the internal affairs. This is due the fact that only specific additional, specialized knowledge about the environmental issues, which is usually multidisciplinary, can provide high-quality, professional and competent research and detection of crimes against the environment. In this paper, the authors deal with the problems of specialization of judicial and other authorities in connection with criminal proceedings for offenses against the environment, of reasonableness and necessity, given the current situation in domestic practice, as well as some comparative solutions and experiences.
Olusi, FI. Vol 6, No 1 (2009) - Articles Students Perception of Cyber Crime in Edo State: Implications for Teaching and Learning Abstract. ISSN: 1813-2227. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...
Ezeano, Nnaemekaa. Vol 16, No 1 (2016) - Articles Deploying ICT with Entrepreneurship Culture can Fight Cyber-Crime Menace in developing countries. Abstract PDF. ISSN: 1116-5405. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's ...
Ayo, Charles Korede. Vol 3, No 1 (2006) - Articles The many faces of cyber-crime: the implications on e-banking. Abstract. ISSN: 1597-4316. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use · Contact ...
Full Text Available In this paper we demonstrate the use of network analysis to characterise patterns of clustering in spatio-temporal events. Such clustering is of both theoretical and practical importance in the study of crime, and forms the basis for a number of preventative strategies. However, existing analytical methods show only that clustering is present in data, while offering little insight into the nature of the patterns present. Here, we show how the classification of pairs of events as close in space and time can be used to define a network, thereby generalising previous approaches. The application of graph-theoretic techniques to these networks can then offer significantly deeper insight into the structure of the data than previously possible. In particular, we focus on the identification of network motifs, which have clear interpretation in terms of spatio-temporal behaviour. Statistical analysis is complicated by the nature of the underlying data, and we provide a method by which appropriate randomised graphs can be generated. Two datasets are used as case studies: maritime piracy at the global scale, and residential burglary in an urban area. In both cases, the same significant 3-vertex motif is found; this result suggests that incidents tend to occur not just in pairs, but in fact in larger groups within a restricted spatio-temporal domain. In the 4-vertex case, different motifs are found to be significant in each case, suggesting that this technique is capable of discriminating between clustering patterns at a finer granularity than previously possible.
In this paper we demonstrate the use of network analysis to characterise patterns of clustering in spatio-temporal events. Such clustering is of both theoretical and practical importance in the study of crime, and forms the basis for a number of preventative strategies. However, existing analytical methods show only that clustering is present in data, while offering little insight into the nature of the patterns present. Here, we show how the classification of pairs of events as close in space and time can be used to define a network, thereby generalising previous approaches. The application of graph-theoretic techniques to these networks can then offer significantly deeper insight into the structure of the data than previously possible. In particular, we focus on the identification of network motifs, which have clear interpretation in terms of spatio-temporal behaviour. Statistical analysis is complicated by the nature of the underlying data, and we provide a method by which appropriate randomised graphs can be generated. Two datasets are used as case studies: maritime piracy at the global scale, and residential burglary in an urban area. In both cases, the same significant 3-vertex motif is found; this result suggests that incidents tend to occur not just in pairs, but in fact in larger groups within a restricted spatio-temporal domain. In the 4-vertex case, different motifs are found to be significant in each case, suggesting that this technique is capable of discriminating between clustering patterns at a finer granularity than previously possible. PMID:26605544
UĞURLU, Elif Gizem
Information Technology Crimes (IT crimes) are commonly known as Computer Crimes, Cyber Crimes, Internet Technology Crimes, Digital Crimes. The varied proliferation of these colloquialisms indicate that these crimes are becoming more and more common in Daily life. The 1999 Information Technology Crimes report drafted by the United Nations and European Union clearly defines types of crimes. The basis of commiting crimes establishes the differences between crimes. Emotional harassment and intimi...
Mukhopadhyay, Anirban; Bandyopadhyay, Sanghamitra; Maulik, Ujjwal
With the advancement of microarray technology, it is now possible to study the expression profiles of thousands of genes across different experimental conditions or tissue samples simultaneously. Microarray cancer datasets, organized as samples versus genes fashion, are being used for classification of tissue samples into benign and malignant or their subtypes. They are also useful for identifying potential gene markers for each cancer subtype, which helps in successful diagnosis of particular cancer types. In this article, we have presented an unsupervised cancer classification technique based on multiobjective genetic clustering of the tissue samples. In this regard, a real-coded encoding of the cluster centers is used and cluster compactness and separation are simultaneously optimized. The resultant set of near-Pareto-optimal solutions contains a number of non-dominated solutions. A novel approach to combine the clustering information possessed by the non-dominated solutions through Support Vector Machine (SVM) classifier has been proposed. Final clustering is obtained by consensus among the clusterings yielded by different kernel functions. The performance of the proposed multiobjective clustering method has been compared with that of several other microarray clustering algorithms for three publicly available benchmark cancer datasets. Moreover, statistical significance tests have been conducted to establish the statistical superiority of the proposed clustering method. Furthermore, relevant gene markers have been identified using the clustering result produced by the proposed clustering method and demonstrated visually. Biological relationships among the gene markers are also studied based on gene ontology. The results obtained are found to be promising and can possibly have important impact in the area of unsupervised cancer classification as well as gene marker identification for multiple cancer subtypes.
Sudhindra Mahoorkar; Anoop Jain
Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.
Mahoorkar, Sudhindra; Jain, Anoop
Over the years, various denture marking systems have been reported in the literature for personal identification. They have been broadly divided into surface marking and inclusion methods. In this technique, patient's unique identification number and barcode printed in the patient's Aadhaar card issued by Unique Identification Authority of India (UIDAI) are used as denture markers. This article describes a simple, quick, and economical method for identification of individual.
Kavitha, Rajagopal; Nazni, Wasi Ahmad; Tan, Tian Chye; Lee, Han Lim; Isa, Mohd Noor Mat; Azirun, Mohd Sofian
Forensic entomology applies knowledge about insects associated with decedent in crime scene investigation. It is possible to calculate a minimum postmortem interval (PMI) by determining the age and species of the oldest blow fly larvae feeding on decedent. This study was conducted in Malaysia to identify maggot specimens collected during crime scene investigations. The usefulness of the molecular and morphological approach in species identifications was evaluated in 10 morphologically identified blow fly larvae sampled from 10 different crime scenes in Malaysia. The molecular identification method involved the sequencing of a total length of 2.2 kilo base pairs encompassing the 'barcode' fragments of the mitochondrial cytochrome oxidase I (COI), cytochrome oxidase II (COII) and t-RNA leucine genes. Phylogenetic analyses confirmed the presence of Chrysomya megacephala, Chrysomya rufifacies and Chrysomya nigripes. In addition, one unidentified blow fly species was found based on phylogenetic tree analysis.
A. A. Vorobeva
Full Text Available Internet is anonymous, this allows posting under a false name, on behalf of others or simply anonymous. Thus, individuals, criminal or terrorist organizations can use Internet for criminal purposes; they hide their identity to avoid the prosecuting. Existing approaches and algorithms for author identification of web-posts on Russian language are not effective. The development of proven methods, technics and tools for author identification is extremely important and challenging task. In this work the algorithm and software for authorship identification of web-posts was developed. During the study the effectiveness of several classification and feature selection algorithms were tested. The algorithm includes some important steps: 1 Feature extraction; 2 Features discretization; 3 Feature selection with the most effective Relief-f algorithm (to find the best feature set with the most discriminating power for each set of candidate authors and maximize accuracy of author identification; 4 Author identification on model based on Random Forest algorithm. Random Forest and Relief-f algorithms are used to identify the author of a short text on Russian language for the first time. The important step of author attribution is data preprocessing - discretization of continuous features; earlier it was not applied to improve the efficiency of author identification. The software outputs top q authors with maximum probabilities of authorship. This approach is helpful for manual analysis in forensic linguistics, when developed tool is used to narrow the set of candidate authors. For experiments on 10 candidate authors, real author appeared in to top 3 in 90.02% cases, on first place real author appeared in 70.5% of cases.
CERN. Geneva; Krichel, Thomas; Jacobs, Neil
Author identication can be provided by authors themselves, or be intermediaries. Authors can be identified ex-post, within sets of bibliographic data, or ex-ante, when publication data is composed. Leo Waaijers introduces the digital author identifier, as working in the DARE project. It is based on old library technology, yet compliant with the forthcoming ISO standard on party identification ISPI. Thomas Krichel introduces the ACIS project (http://acis.openlib.org) and its first implementation in the RePEc author service (http://authors.repec.org). This is a low-cost approach. It relies on authors themselves to register. A central registration is a pure ex-post operation. However, it can be combined with an archival operation to permit additional ex-ante registered author data.
Full Text Available The development of information technologies and information systems brings also about an increase of violations in this area. In this study, cybercrimes within the scope information technology law, are, by means of content analysis of Supreme Court’s Decisions, examined. Within this framework, considerations such as their subjects, features, application conditions of laws, problems occurred and defective points are addressed. As a result of the analysis, the provisions of the law violated are stated with the reasons. Provisions related to cybercrimes in the law number 5237 the Turkish Criminal Code constitute main frame of the study. At the end of the analysis, it was deduced that violations mainly occurred within the framework of the articles 244 and 245th.
Edelman, G. J.; van Leeuwen, T. G.; Aalders, M. C. G.
Blood stains are an important source of information in forensic investigations. Extraction of DNA may lead to the identification of victims or suspects, while the blood stain pattern may reveal useful information for the reconstruction of a crime. Consequently, techniques for the detection and identification of blood stains are ideally non-destructive in order not to hamper both DNA and the blood stain pattern analysis. Currently, forensic investigators mainly detect and identify blood stains using chemical or optical methods, which are often either destructive or subject to human interpretation. We demonstrated the feasibility of hyperspectral imaging of the crime scene to detect and identify blood stains remotely. Blood stains outside the human body comprise the main chromophores oxy-hemoglobin, methemoglobin and hemichrome. Consequently, the reflectance spectra of blood stains are influenced by the composite of the optical properties of the individual chromophores and the substrate. Using the coefficient of determination between a non-linear least squares multi-component fit and the measured spectra blood stains were successfully distinguished from other substances visually resembling blood (e.g. ketchup, red wine and lip stick) with a sensitivity of 100 % and a specificity of 85 %. The practical applicability of this technique was demonstrated at a mock crime scene, where blood stains were successfully identified automatically.
.... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...
DeFrancesco, Anton; McQueary, Bruce
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
Kim, Si Won [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)
It is the United States that shows the most enthusiastic preparation for the protection of NPPs from cyber threats. The United States has been trying to improve cybersecurity of NPPs since the 911 terror in 2001. In this process, the Nuclear Regulatory Commission (NRC) of the U.S. demanded the protection of the digital systems in NPPs to the licensee through 10 CFR 73.54. Moreover, RG 5.71 defined the assets, which should be protected from cyber threats, as Critical Digital Asset (CDA). Nuclear Energy Institute (NEI) provided the CDA identification guide through NEI 10-04. Meanwhile, International Electrotechnical Commission (IEC) presented the security program requirements of I and C computer in NPP, as well as category about systems and functions through IEC 61226 which is under revision. In Korea, Korea Institute of Nuclear Nonproliferation and Control (KINAC) established KINAC/RS-019, which is based upon NEI 10-04 and adapted to Korean circumstances. As time goes by, the digital systems in NPPs increase and the possibilities of cyber threats becomes greater. To protect these systems from cyber attacks, it is important to identify CDA, which is the target to be protect. For that, the standards to identify CDA were established, and according to the standards, the licensees could perform identification works and draw many CDAs. During the inspection processes for this, KINAC could find several problems and has been tried to look for the solutions. It is desired that such solutions will be actively used when identifying CDAs in NPPs, and also they should be applied to the systems which are added or changed during the whole facility life cycle.
Kim, Si Won
It is the United States that shows the most enthusiastic preparation for the protection of NPPs from cyber threats. The United States has been trying to improve cybersecurity of NPPs since the 911 terror in 2001. In this process, the Nuclear Regulatory Commission (NRC) of the U.S. demanded the protection of the digital systems in NPPs to the licensee through 10 CFR 73.54. Moreover, RG 5.71 defined the assets, which should be protected from cyber threats, as Critical Digital Asset (CDA). Nuclear Energy Institute (NEI) provided the CDA identification guide through NEI 10-04. Meanwhile, International Electrotechnical Commission (IEC) presented the security program requirements of I and C computer in NPP, as well as category about systems and functions through IEC 61226 which is under revision. In Korea, Korea Institute of Nuclear Nonproliferation and Control (KINAC) established KINAC/RS-019, which is based upon NEI 10-04 and adapted to Korean circumstances. As time goes by, the digital systems in NPPs increase and the possibilities of cyber threats becomes greater. To protect these systems from cyber attacks, it is important to identify CDA, which is the target to be protect. For that, the standards to identify CDA were established, and according to the standards, the licensees could perform identification works and draw many CDAs. During the inspection processes for this, KINAC could find several problems and has been tried to look for the solutions. It is desired that such solutions will be actively used when identifying CDAs in NPPs, and also they should be applied to the systems which are added or changed during the whole facility life cycle
Reddy, G. Nikhita; Reddy, G. J. Ugander
Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...
Full Text Available Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This paper attempts to provide an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It look at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The paper also attempts to name some challenges of cybercrime and present practical and logical solutions to these threats.
de Gruijter, Madeleine; Nee, Claire; de Poot, Christianne J
Crime scenes can always be explained in multiple ways. Traces alone do not provide enough information to infer a whole series of events that has taken place; they only provide clues for these inferences. CSIs need additional information to be able to interpret observed traces. In the near future, a new source of information that could help to interpret a crime scene and testing hypotheses will become available with the advent of rapid identification techniques. A previous study with CSIs demonstrated that this information had an influence on the interpretation of the crime scene, yet it is still unknown what exact information was used for this interpretation and for the construction of their scenario. The present study builds on this study and gains more insight into (1) the exact investigative and forensic information that was used by CSIs to construct their scenario, (2) the inferences drawn from this information, and (3) the kind of evidence that was selected at the crime scene to (dis)prove this scenario. We asked 48 CSIs to investigate a potential murder crime scene on the computer and explicate what information they used to construct a scenario and to select traces for analysis. The results show that the introduction of rapid ID information at the start of an investigation contributes to the recognition of different clues at the crime scene, but also to different interpretations of identical information, depending on the kind of information available and the scenario one has in mind. Furthermore, not all relevant traces were recognized, showing that important information can be missed during the investigation. In this study, accurate crime scenarios where mainly build with forensic information, but we should be aware of the fact that crime scenes are always contaminated with unrelated traces and thus be cautious of the power of rapid ID at the crime scene. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights
Full Text Available The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network. Human trafficking and human organ trafficking are changing in line with the state-of-art technological achievements i.e. becoming more and more characteristic of cyber space. Passing appropriate regulations at both national and international levels presents an important step in solving the problem of human organ trafficking through Internet.
Jawad Hussain Awan
Full Text Available Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
Waade, Anne Marit
The purpose of this article is to illuminate the significance of locations in TV series, in particular in crime series. The author presents different theoretical approaches on settings and landscapes in TV series and crime stories. By analysing both the Swedish and the British versions...... of the Wallander series, the author examines the various types of location used, focusing especially on their dramaturgic and aesthetic roles and on the various ways in which locations are conceptualized in the two series. The analysis also includes extra materials on the DVDs. Finally, the author discusses some...... theoretical and methodological challenges of analysing the significance and impact of locations in TV productions....
Full Text Available Breast cancer is an all too common disease in women, making how to effectively predict it an active research problem. A number of statistical and machine learning techniques have been employed to develop various breast cancer prediction models. Among them, support vector machines (SVM have been shown to outperform many related techniques. To construct the SVM classifier, it is first necessary to decide the kernel function, and different kernel functions can result in different prediction performance. However, there have been very few studies focused on examining the prediction performances of SVM based on different kernel functions. Moreover, it is unknown whether SVM classifier ensembles which have been proposed to improve the performance of single classifiers can outperform single SVM classifiers in terms of breast cancer prediction. Therefore, the aim of this paper is to fully assess the prediction performance of SVM and SVM ensembles over small and large scale breast cancer datasets. The classification accuracy, ROC, F-measure, and computational times of training SVM and SVM ensembles are compared. The experimental results show that linear kernel based SVM ensembles based on the bagging method and RBF kernel based SVM ensembles with the boosting method can be the better choices for a small scale dataset, where feature selection should be performed in the data pre-processing stage. For a large scale dataset, RBF kernel based SVM ensembles based on boosting perform better than the other classifiers.
The Department of Defense Must Combat Cyber Terrorism With Cyber Attacks EWS Contemporary Issues Paper Submitted by Captain P. A...The Department of Defense Must Combat Cyber Terrorism With Cyber Attacks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...technological assets used by adversaries. The biggest change to policy that allowed for cyber attacks occurred in October 2002 when the Joint Task Force
Roberts, Kevin J.
Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…
Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence…
governments. Governments also have the capacity to carry out offensive cyber attacks .39 For example, America’s Tenth Fleet and Twenty-fourth Air Force... Cyber attacks that deny service or disrupt systems are also carried out by non-state actors whether for ideological or criminal purposes, but such...groups may make them natural allies for nation-states looking for a way to augment their capabilities while denying involvement in cyber attacks .”51 The
concept of deterrence in the cyber domain as relatively immature. "We’re going to have to work our way through this by developing and accepting...Dorothy Denning provides another reason why the concept of cyber deterrence raises so many challenges. She states, “In no other domain of warfare...networks with guidance and direction from well thought out and continuously updated cyber policies. Mike McConnell , former director of the NSA
Sri Ayu Astuti
Full Text Available Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015. Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2, 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82
Full Text Available Without certain adjustments to specifics of computer crime, as to a phenomenon of global proportions, detection, investigation and prosecution of this type of crime is almost impossible. Therefore, the need for setting up a legal framework for combating cyber crime has been identified, in order to define which activities related to information systems are considered computer crime; to determine the specific procedural rules, which would enable the access to data, computer and networks during investigating and prosecuting computer crime and to provide continuous training of members of the institutions responsible for countering this form of crime. This legal framework should consist of substantive and procedural rules adapted to this type of crime due its aim is the improvement of international cooperation in the framework of global and regional approach to combating cyber crime. In this this paper the current situation of strategic and legal framework of countering cyber crime is presented (at the level of the Council of Europe and of the European Union as well as trends in the development of systematic approach towards countering the mentioned abuses within these regional organizations. At the European level, the legal framework to combat cyber crime is set in the Council of Europe Convention on cyber crime and the Council of EU Framework Decision on attacks against information systems. In a series of documents organs of EU confirmed the strategic support of COE Convention and the encouragement of Member States to ratify the Convention. In addition, the Convention represent the base of the said Framework Decision. These two legal instruments have the same goal - removing the differences between national legislation, the introduction of new powers in the discovery and evidence of computer crime and improvement of the international cooperation in combating cyber crime. Although their legal nature and scope vary, its objectives will be achieved
van Haaster, J.; Gevers, R.; Sprengers, M.
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for
Voeller, John G
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
The theme of the bachelor paper is "Attempted Crime." Attempted crime is unfinished criminal offense and the person carrying out an attempted crime threat to the interests protected by the Criminal Law. In the Judicial practice, there are problems of crime attempt qualification, distinguishing between the completed offenses, preparation for a crime. The judicial practice, there are problems of crime attempt qualification, distinguishing between the completed offense, preparation for a crime....
Geoffrey H. Donovan; Jeffrey P. Prestemon
The authors estimate the relationship between trees and three crime aggregates (all crime, violent crime, and property crime) and two individual crimes (burglary and vandalism) in Portland, Oregon. During the study period (2005-2007), 431 crimes were reported at the 2,813 single-family homes in our sample. In general, the authors find that trees in the public right of...
Hult, Fredrik; Sivanesan, Giri
In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.
Henderson, Laura S.; Subbarao, Kamesh
This work presents a case wherein the selection of models when producing synthetic light curves affects the estimation of the size of unresolved space objects. Through this case, "inverse crime" (using the same model for the generation of synthetic data and data inversion), is illustrated. This is done by using two models to produce the synthetic light curve and later invert it. It is shown here that the choice of model indeed affects the estimation of the shape/size parameters. When a higher fidelity model (henceforth the one that results in the smallest error residuals after the crime is committed) is used to both create, and invert the light curve model the estimates of the shape/size parameters are significantly better than those obtained when a lower fidelity model (in comparison) is implemented for the estimation. It is therefore of utmost importance to consider the choice of models when producing synthetic data, which later will be inverted, as the results might be misleadingly optimistic.
R. Dyatmiko Soemodihardjo
White collar crime is a crime that carried out by respected persons, whereas corporate crime is a crime that related to corporation. White collar crime and crime corporate are always related to economic crime. White collar crime can be committed by corporation, that is why a kind of crime emerges namely corporate crime.
R. Dyatmiko Soemodihardjo
Full Text Available White collar crime is a crime that carried out by respected persons, whereas corporate crime is a crime that related to corporation. White collar crime and crime corporate are always related to economic crime. White collar crime can be committed by corporation, that is why a kind of crime emerges namely corporate crime.
Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...
In late August 2012 the Government Forum of Incident Response and Cyber security Teams (GFIRST) gathered in Atlanta to discuss cyber threats and how new realities are emerging and how new forms of regulation are needed. At the same time Policing cyber hate, cyber threat and cyber terrorism was published. This comprehensive book brings together a divergent problem and tackles each with a candid exploration. The book has ten chapters and covers aspects such as extortion via the internet, the ps...
Full Text Available The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no internationally accepted definitions on the subject, mostly because of the relative recency of the terms. The second part analyzes the cyber realities of recent years, emphasizing the most advertised cyber attacks in the international mass media: Estonia (2007 and Georgia (2008, with a focus on two main lessons learned: how complicated is to define a cyber war and how difficult to defend against it. Crucial implications for world’s countries and the role of NATO in assuring an effective collective cyber defense are analyzed in the third part. The need for the development of strategic cyber defense documents (e.g. NATO Cyber Defense Policy, NATO Strategic Concept is further examined. It is suggested that particular attention should be paid to the development of a procedure for clearly discriminating between events (cyber attacks, cyber war, cyber crime, or cyber terrorism, and to a procedure for the conduct of nation’s legitimate military/civil cyber response operations.
Volk, P; Hilgarth, M; Kolter, J
Medico-legal and criminological examinations of 93 sexual crimes are reported. This figure comprises all the crimes which have become known to the police during a certain period in one region. It is suggested that the medical examination by confined to specific wards of the gynecological hospital so that psychological care can be provided and the customary criminological investigation methods be changed. For preventive reasons, a general expertise of the offenders and credibility examinations of victims and offenders seem to be called for in the absence of satisfactory evidence. Physical resistance on the part of the victim in the present cases led to a significant increase in the injury and death rate. How far traditional social views toward women favor sexual crime is discussed.
Michael T. Light
Full Text Available How the influx of Hispanics is reshaping the U.S. racial landscape is a paramount question in sociology. While previous research has noted the significant differences in Hispanics’ racial identifications from place to place, there are comparatively few empirical investigations explaining these contextual differences. We attempt to fill this gap by arguing that residential context sets the stage for racial boundary negotiations and that certain environments heighten the salience of inter-group boundaries. We test this argument by examining whether Hispanics who live in highly segregated areas and areas that experience greater levels of anti-Hispanic prejudice are more likely to opt out of the U.S. racial order by choosing the “other race” category in surveys. Using data from the American Community Survey and information on anti-Hispanic hate crimes from the FBI, we find support for these hypotheses. These findings widen the theoretical scope of the roles segregation and prejudice play in negotiating racial identifications, and have implications for the extent to which Hispanics may redefine the U.S. racial order.
Full Text Available The process of globalization is affecting all areas of social life, and thus no exception crime. Its effect is most evident in the development of new forms of crime that transcends national borders and states receive a supranational character. This primarily refers to the various forms of organized crime, but also in certain of its forms, which are a kind of state violence and the consequences of which are reflected in the systematic violation of human rights. Also, the process of globalization of crime has caused the formation of international organizations aimed at combating of crime which transcends national boundaries. New forms of crime are conditioned by globalization demanded a new approach to their study. Existing criminological theories have proven inadequate in explaining all the causes that lead to crime. It was necessary to create new theories and new doctrines about the causes of crime. In the continuous process of development of criminology, in constant search for new explanations of the causes of crime, within the sociological theories have emerged and globalization theories of criminality, which the authors in their work special attention. The focus of the globalization theory on crime just on its prevention, to reduce the risk of its occurrence. This is certainly a positive step because it shifts the focus of criminologists with immediate causes of crime and focus on the study of their interactions, which is largely socially conditioned, which is especially prominent in the work. The aim of this paper is to point out that globalization theories should not be viewed in isolation from other criminological theories and doctrines, but that one, although relatively new, contribute to the creation of complete systems of criminological doctrines in order to find the optimal social response to crime.
Full Text Available This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.
Carlin, Anna; Manson, Daniel P.; Zhu, Jake
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Full Text Available The rapid development and use of information and communication technology (ICT) has influenced everyday life, mostly in a positive manner. This technology is, however, also available to the criminally minded. Activities performed through ICT leave...
Lelekov, V. A.; Kosheleva, E. V.
Crimes committed by juveniles are among the most urgent social problems. Juvenile crime is as prevalent as crime itself is, and it has not been solved completely in any society and cannot be solved through law enforcement measures alone. In this article, the authors discuss the dynamics and structure of juvenile crime in Russia and present data…
Virkler, Kelly; Lednev, Igor K
Body fluid traces recovered at crime scenes are among the most important types of evidence to forensic investigators. They contain valuable DNA evidence which can identify a suspect or victim as well as exonerate an innocent individual. The first step of identifying a particular body fluid is highly important since the nature of the fluid is itself very informative to the investigation, and the destructive nature of a screening test must be considered when only a small amount of material is available. The ability to characterize an unknown stain at the scene of the crime without having to wait for results from a laboratory is another very critical step in the development of forensic body fluid analysis. Driven by the importance for forensic applications, body fluid identification methods have been extensively developed in recent years. The systematic analysis of these new developments is vital for forensic investigators to be continuously educated on possible superior techniques. Significant advances in laser technology and the development of novel light detectors have dramatically improved spectroscopic methods for molecular characterization over the last decade. The application of this novel biospectroscopy for forensic purposes opens new and exciting opportunities for the development of on-field, non-destructive, confirmatory methods for body fluid identification at a crime scene. In addition, the biospectroscopy methods are universally applicable to all body fluids unlike the majority of current techniques which are valid for individual fluids only. This article analyzes the current methods being used to identify body fluid stains including blood, semen, saliva, vaginal fluid, urine, and sweat, and also focuses on new techniques that have been developed in the last 5-6 years. In addition, the potential of new biospectroscopic techniques based on Raman and fluorescence spectroscopy is evaluated for rapid, confirmatory, non-destructive identification of a body
Meyers, C A; Powers, S S; Faissol, D M
In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.
Full Text Available The last twenty years, since the fall of the Berlin wall in 1989, more than 120 violent conflicts waged across the globe and hundreds of thousands of people killed, disappeared, handicapped or left in distress.Violent conflicts involve frequent human rights violations as well as many crimes. These kinds of crimes are usually very serious and tend to involve many victims, and have attracted attention from a variety of disciplines, including social and political scientists and (criminal lawyers. Therefore, the author argues that criminology as an academic discipline has until recently hardly been interested in studying international crimes.In order to understand this, the author is firstly interested in sketching the background of the concept of international crimes and comparing it with the notion of political crimes and also with that of serious human rights violations. Secondly, international crimes will be situated in their political context of transitional justice and its links with organized crime will be explored.
Perkembangan teknologi informasi dan komunikasi menyebabkan hubungan dunia menjadi tanpa batas dan menyebabkan Perubahan sosial, ekonomi, dan budaya secara signifikan berlangsung dengan demikian cepat. Teknologi informasi saat ini menjadi pedang bermata dua, karena selain memberikan kontribusi bagi peningkatan kesejahteraan, kemajuan, dan peradaban manusia, sekaligus menjadi sarana efektif perbuatan melawan hukum. Di satu sisi kemajuan teknologi membawa dampak positif, namun juga membawa damp...
Rajeswari, C.; Soni, Krishna; Tandon, Rajat
Big data is like performing computation operations and database operations for large amounts of data, automatically from the data possessor’s business. Since a critical strategic offer of big data access to information from numerous and various areas, security and protection will assume an imperative part in big data research and innovation. The limits of standard IT security practices are notable, with the goal that they can utilize programming sending to utilize programming designers to incorporate pernicious programming in a genuine and developing risk in applications and working frameworks, which are troublesome. The impact gets speedier than big data. In this way, one central issue is that security and protection innovation are sufficient to share controlled affirmation for countless direct get to. For powerful utilization of extensive information, it should be approved to get to the information of that space or whatever other area from a space. For a long time, dependable framework improvement has arranged a rich arrangement of demonstrated ideas of demonstrated security to bargain to a great extent with the decided adversaries, however this procedure has been to a great extent underestimated as “needless excess” and sellers In this discourse, essential talks will be examined for substantial information to exploit this develop security and protection innovation, while the rest of the exploration difficulties will be investigated.
Robert J. Turk
information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).
fraud; child pornography ; and infringements of copyright and related rights. Unlike cyber crime, the definition of cyber war is not neatly defined or...over electronic media (e.g., child sexual abuse material or incitement to racial hatred); 3) crimes unique to electronic networks (e.g., attacks... child sexual abuse material” only. Second, “computer systems and electronic networks” should replace “electronic communication networks and information
... AUTHORIZATION AND ADMINISTRATION OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Application Procedures § 3.22 Number of accounting authority identification codes per applicant... 47 Telecommunication 1 2010-10-01 2010-10-01 false Number of accounting authority identification...
strategic thinking about cy- berwar reflects an awareness that this duality applies to the virtual domain as well. The history of air campaigns over the...life sciences he iden- tifies analogies in the realms of biodiversity and herd immunity . And then he flips the (seemingly unusable) notion of economic...suggests that diver- sity of cyber systems makes the defense as weak as its weakest component. 30. Herd Immunity If a sufficient proportion of the
a cyber attack could present a significant risk to U.S. national security. House Report 114- 102 included a provision that GAO assess DOD’s plans...participated in exercises to support civil authorities in a cyber incident or to test the responses to simulated attacks on cyber infrastructure owned by...year Cyber civil-support objective Cyber Guard 15 U.S. Cyber Command 2015 Test DOD participation in a response to a cyberattack of significant
Full Text Available The world today is experiencing an exponential growth in cyberspace. Nevertheless, India too has witnessed a significant ascend in Internet activities and it is quite assertive to say that such phenomenal growth in access to information on one hand leads to empowered individuals and organization and on the other hand also poses new challenges to government and citizens. To make the cyber world safe is the need of the hour. Putting up deterrent measures against cybercrime is essential to national cyber security in protecting critical infrastructure of the nation as well as for individuals. In this regard, the prime objective of the government is to prevent cyber attacks and to protect the country's critical infrastructure. It also focuses on reducing vulnerability to cyber attacks so as to reduce and minimize damage and recovery time. To prevent the cyber crimes, individuals and governments need to clearly understand the crime schemes in the cyberspace and the contemporary and continuing Internet trends and behaviours of these criminals. This paper gives a brief outline of categories of cybercrimes. These crimes are categorized as crimes against individuals, property, organizations and governments. Various Internet crime scheme are evaluated and behaviour of criminals to perform the cybercrimes has been analyzed. A critical evaluation of report of cybercrime complaints under IT Act 2000 has been presented.
Astell-Burt, Thomas; Feng, Xiaoqi; Kolt, Gregory S
Equivocal findings on crime as a deterrent for physical activity may be due to effects of geographic scale on exposure measurement. To investigate this hypothesis, physical activity was measured in 203,883 Australians and linked to standardised crime counts within small ('Census Collection Districts'; approx. 330 residents) and larger areas ('Statistical Local Areas'; approx. 32,000 residents). A median rate ratio of 2.26 indicated substantive geographic variation in moderate-to-vigorous physical activity (MVPA). Adjusting for confounders, multilevel negative binomial regression reported lower MVPA with more crime consistently in small, but not in larger areas. Reducing small pockets of local crime may encourage more physically active lifestyles. Copyright © 2014. Published by Elsevier Ltd.
Richard B. Felson
Full Text Available I propose a dual conceptualization of violent crime. Since violent crime is both violence and crime, theories of aggression and deviance are required to understand it. I argue that both harm-doing and rule breaking are instrumental behaviors and that a bounded rational choice approach can account for both behaviors. However, while some of the causes of harm-doing and deviance (and violent and nonviolent crime are the same, some are different. Theories of crime and deviance cannot explain why one only observes individual and group differences in violent crime and theories of aggression and violence cannot explain why one observes differences in all types of crimes. Such theories are “barking up the wrong tree.”
City and County of Durham, North Carolina — This metadata contains information on crime definitions and location obfuscation techniques to protect citizen identification data. Officers responding to incidents...
Full Text Available Today computer crime belongs to transnational criminal organizations which have new rules for the development of new strategies able to enrol people in their organizations and to obtain profits from money laundering. These new forms of crime which are more and more related to sophisticated data processing technologies must urge institutional agencies for new strategies against crime
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil
Brax, David; Munthe, Christian
In this introduction to the special symposium on the philosophy of hate crime, we provide an overview of the main philosophical aspects of hate crime and hate crime legislation. We point out that there are two overarching philosophical issues that span over the literature: the Conceptual Question--concerning what hate crime is--and the Normative Question--concerning the status of hate crimes and the justification of hate crime legislation. We also provide brief summaries of the articles in the special section and point to their relations to the broader themes. © The Author(s) 2014.
Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.
Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)
Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel
Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.
Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis
Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.
Economic crime, often also referred to as white collar crime, is one of the most incidious and predatory of offenses. Unlike street crime, for which there may well be some protection, the average citizen is completely at the mercy of the perpetrators of economic crimes. The concept of white collar crime was first identified by Edwin H. Sutherland. He dealt with the problem as a violation of trust involving either or both misrepresentation and duplicity. He argued for the use of criminal sanctions rather than civil remedies as a means of dealing with white collar offenses. Sutherland's views were attacked by the legal profession, by sociologists and criminologists and by public opinion specialists. They contended that an act treated in civil court is not a crime; that criminals are those persons who are defined as such and white collar criminals are neither so defined nor do they define themselves as criminals and, finally, that economic crime is universal. Can anyone be criminal, then, ask the critics? A number of studies by Clinard, Quinney, Black, Ball, Cressey, Newman and others have translated the interest in white collar crime into empirical terms. The last thirty-five years have also witnessed the elaboration and alteration of the theory itself. Geis' work has been particularly important in this respect. His "street" versus "suite" crime is a useful dichotomy. Most important, however, have been the monograph and papers by Herbert Edelhertz who has conceptualized the issues on various levels - from consumer fraud to the illegal activities of the multinational corporation. This article is concerned with the exposition of the theory and research in the field. Most significant, the paper raises serious doubts whether the problem of economic crime can be researched and studied; it raises even more difficult issues concerning the legal and sociological implications of economic crime and of its prevention, management and control.
Reichel, Philip L.
Provides information on developing a short college level module on crime and societal reaction in communist society. Presented are techniques for gauging student knowledge of crime in communist states, theories by communist criminologists, and comparative criminology suggestions. (Author/DB)
Lavorgna, Anita; Sergi, Anna
This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms “serious” and “organised” in policies against organised crime in the UK. The conceptualisation of organised crime as national security threat supports our hypothesis that a similar critique can be applied to the emerging narrative of cyber-organised crime in the country. We argue that, whereby organised crime has become essentially “serious” as consequence of its characterisa...
The bachelor thesis deals with the cyber risk in banking industry. Its main goal is to stress the imporatance of cyber risk both verbally and numericaly and review the approach of banks to this risk. The first part of this thesis specifies what cyber risk is and how it fits among other operational risks, presents the common cyber-attacks and archetypes of cyber criminals, later it delves into the cyber risk in Czech Republic and at the end of this part it mentions the legislation that covers ...
Cardinaux, Fabien; Marcel, Sébastien
The performance of machine learning algorithms has steadily improved over the past few years, such as MLP or more recently SVM. In this paper, we compare two successful discriminant machine learning algorithms apply to the problem of face verification: MLP and SVM. These two algorithms are tested on a benchmark database, namely XM2VTS. Results show that a MLP is better than a SVM on this particular task.
For the purpose of this call, cyber policy is defined as the broad area related to governing information or knowledge societies and includes issues related to innovation (such as intellectual property, telecommunications, infrastructure), security (related to national security, crime, surveillance), and human rights (such as the ...
... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political candidate authorization notice and sponsorship identification. 73.4190 Section 73.4190 Telecommunication FEDERAL COMMUNICATIONS COMMISSION....4190 Political candidate authorization notice and sponsorship identification. (a) See Joint Public...
Nehad Farouk Abbas Mohamed
Full Text Available Rapid advances in information technology (IT form the backbone of the development of everyday life and a knowledge-based society. At present, there is more and more attention being paid to IT because of its extensive use in all spheres of life. Due to this massive cyber development, new type of crimes with complex and multifaceted nature have evolved. This is in contrast to traditional crimes from all angles, whether security or geographical based. Due to this, a number of challenges and dangers or threatening specialist judicial authorities and hamper their work and technical abilities in performing the tasks entrusted to them, particularly in crime investigation and prosecution. Because of the complex nature and detailed technical procedures applied at each stage of crime investigation, much greater efforts are required to reveal the hidden realities of an electronic crime. Therefore, investigation authorities, judiciary and other relevant bodies require an up to date knowledge of new technologies to be able to perform their allocated tasks precisely according to defined rules and regulations, and identify the perpetrator correctly.
Erdinc Ozturk; Gizem Akcan
Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students w...
National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.
Mandasari Saragih, Yasmirah; Medaline, Onny
In effect the authority abuse very closely relates to the presence of invalidity (disability juridical) of a decision or government action/state officials. Sadjijono, by citing the opinion of M. Hadjon Phlipus suggests that defective judicial decision or government action/state officials generally involves three main elements, namely the element of authority, the element of the procedure and elements of substance, thus flawed judicial action state officials can be classified into three kinds, namely: disability authority, defective procedure and substance defects. The three of them are the essence of the onset authority abuse. Their acts that profitable and or self-enrich or another person or entity covering for the authority abuse or opportunity. These criteria have been expanded because there is a term for position and so on, including bribery, both among non-civil and public servants. Reciprocally with the given gifts and the promise of the new legislation, the criteria have been expanded.
Project Air Force. Santa Monica, CA: RAND Corporation, 2012. Healey , Jason . “Claiming the Lost Cyber Heritage.” Strategic Studies Quarterly 6, no. 3...We next look at specific options to reshape, grow, and retain a sustainable 1B4 cyber force for the future. Notes 1. Healey , “Lost Cyber Heritage
... (including pornography and child solicitation). The NAPA panel recommended that DoD consider providing approval authority to the Services' General Counsels or to some other appropriate Service official...
In this article, two cases of crimen iniuria are reported in which the suspect could be identified, on the basis of a forensic linguistic analysis, as the author of defamatory documents – one which resulted in litigation and an eventual conviction, and one which was dealt with intrainstitutionally by the authorities concerned ...
Full Text Available The paper explores forms of electronic fraud which are being perpetrated in the banking industry and the challenges being faced in an attempt to combat the risk. The paper is based on a descriptive study which studied the cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that most of the cited types of electronic fraud are perpetrated across the banking industry. Challenges like lack of resources (detection tools and technologies, inadequate cyber-crime laws and lack of knowledge through education and awareness were noted. It is recommended that the issue of cyber security should be addressed involving all the stakeholders so that technological systems are safeguarded from cyber-attacks
Virtual crimes are a new specific area in the law system, which is associated with information technologies (mobile, Internet etc.). These are crimes that can be committed in cyberspace or in connection with it. Generally, cyberspace can be defined from different perspectives most often as social, technological and legal environment in which there is mutual interaction of its users. This environment, in particular the Internet, due to its characteristics such as unlimited local, speed, low co...
Faga Hemen Philip
Full Text Available This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.
This essay investigates whether students who attend higher-quality schools commit fewer crimes. If so, improving school quality might be worth considering as an approach to reducing juvenile crime. The author finds some evidence that higher-quality schools are associated with lower probabilities of committing some types of crime. (Contains 1…
Pisarić Milana M.
Full Text Available Detection and identification of ecological crimes requires specific, specialized knowledge of the competent authorities and the work of the police in detecting and proving involves cooperation with the competent inspection services and other organs. Of particular significance in detecting offenses of ecological criminal is timely and properly taking fisrt operation, in particular crime scene investigation and situational and reconstructive expertise. In order to find answers to the gold forensics issues when conducting investigation, and to identify, fix and secure traces and objects of the offense, it is necessary to engage experts in the appropriate field. In order found traces and objects to may be used in the criminal proceedings, they need to be processed in accordance with all the rules of criminalistics. Therefore, timely consultation between the police, the public prosecutor and the forensics are essential for the successful investigation and prosecution.
... Governing the Certification of Sanitary Design and Fabrication of Equipment Used in the Slaughter, Processing, and Packaging of Livestock and Poultry Products § 54.1017 Authority to use official...
Full Text Available With the enrichment of perception methods, modern transportation system has many physical objects whose states are influenced by many information factors so that it is a typical Cyber-Physical System (CPS. Thus, the traffic information is generally multi-sourced, heterogeneous and hierarchical. Existing research results show that the multisourced traffic information through accurate classification in the process of information fusion can achieve better parameters forecasting performance. For solving the problem of traffic information accurate classification, via analysing the characteristics of the multi-sourced traffic information and using redefined binary tree to overcome the shortcomings of the original Support Vector Machine (SVM classification in information fusion, a multi-classification method using improved SVM in information fusion for traffic parameters forecasting is proposed. The experiment was conducted to examine the performance of the proposed scheme, and the results reveal that the method can get more accurate and practical outcomes.
Nur Khalimatus Sa'diyah
Full Text Available Anxiety against cybercrime has become the world’s attention, but not all countries in the world is giving greater attention to the problem of cybercrime by having the rule and unless the developed countries and some developing countries. The purpose of this research is in order to find, examine and analyze the efforts of the Indonesia Government in the protection of State secrets information and data, also to research the forms of Indonesia Government resistance against cyber war. Find a reconstruction of national cyber defense formation or cyber army in an attempt to defend the sovereignty of the country. In Act No. 3 of 2002 on State Defense, it has been established that the threat in the country’s defense system consists of a military threat and non-military threat, which is including cyber threats. One of the negative effects of the cyber world development via the internet among other things is a crime in violation of the law cybercrime, where when the escalation widely spread, it could have threatened the country’s sovereignty, territorial integrity or the safety of the nation. In an effort to combat against the attacks in this virtual world, will require an agency that is in charge of being the world’s bulwark cyber or cyber defense.
The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)
Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.
Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a month’s worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin® for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a month’s worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.
... and significant impact on the coastal waters, including a listing of relevant state constitutional... requirements, the program must identify relevant state constitutional provisions, statutes, regulations, case... of authorities. (a)(1) The management program must identify the means by which the state proposes to...
Full Text Available Cyber Literature is a term known since the coming of the internet which brings a convenience, changing habit and world view. This study is a survey-based on respondents’ opinion about the existence of cyber literature on social media; of its benefit and impact to the reader. This study limits to the poems on Facebook group. The reason is simple; it favors the short form. For the study of a reader-writer interactivity in cyber literature is more likely on poetry. The approach is reader response literary theory with focus on the reader-writer interactivity on Facebook. This research aimed at uncovering the motivation of readers to response the uploaded text, the reasons why they love it and what its advantages. The results showed that cyber literature is successfully to introduce a new literary genre as well as to raise motivation and creativity of authors to make use the internet space.
Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna
This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.
Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...
Full Text Available Direct Torque Control (DTC, proposed after Vector Control (VC, has been widely used in speed regulation system due to its good dynamic performance. In order to solving the shortage of poor torque stationary properties of traditional DTC, this paper introduces direct torque control using space vector modulations (SVM-DTC in Permanent Magnet Synchronous Motor (PMSM system, which reduces torque ripple by using SVM and maintains fast dynamic response. Simulation model of SVM-DTC under MATLAB condition has been set up and compared with system controlled by traditional DTC. The results testify that the PMSM system based on SVM-DTC has high rate dynamic response, high stationary precision, and good robustness when load has a disturbance.
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Pe...
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral
Ringsmose, Jens; Teglskov Jacobsen, Jeppe
It has become a conventional wisdom in strategic studies that the development and use of cyber weapons should be kept secret, as the effectiveness of these tools is dependent on opponents being unaware of a particular cyber weapon’s characteristics. Why, then, has the US military repeatedly publi...... the enemy’s trust in his own IT-infrastructure, and command and control systems, (3) signal “cyber strength” to third parties, and (4) establish norms regarding how to use cyber weapons in accordance with International Humanitarian Law.......It has become a conventional wisdom in strategic studies that the development and use of cyber weapons should be kept secret, as the effectiveness of these tools is dependent on opponents being unaware of a particular cyber weapon’s characteristics. Why, then, has the US military repeatedly...
Full Text Available Cyber space bullying is a relatively new phenomenon that has received increased attention by scientists, researchers and practitioners in recent years. It is usually defined as an intentionally and repeatedly expression of aggression towards other people through information and communication technologies. Cyber space bullying is characterized by all the primary characteristics of traditional bullying and some specifics ones that clearly differ it from other forms of bullying. In addition to the analysis of characteristics and specifics of cyber space bullying, the paper describes the basic forms of cyber space bullying (flaming, harassment, denigration, impersonation, outing, trickery, exclusion, stalking and happy slapping, as well as, the types of cyber space bullies (vengeful angel, power-hungry, revenge of the nerd, mean girls and inadvertent. The main goal of this paper is to provide initial theoretical guidelines for designing future empirical research on the complex phenomenon of cyber space bullying.
Dragan D. Mladenović
Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.
Full Text Available This paper is primarily devoted to issues related to the normative regulation of hate crimes, with special reference to the regulations of the Republic of Serbia, which are indirectly related to this matter. This kind of crimes are characterized by prejudices that perpetrators have towards injured parties, as members of certain, mostly, minority groups, due to which many hate crimes could be also called crimes of prejudice. In comparative law there are two different basic directions when it comes to regulating hate crimes: separation of hate crimes in a separate category on the one hand, and punishment of perpetrators of criminal acts with the detriment of minority groups through the usual charges of a given criminal justice system, on the other. The author finds that, regardless of the formal response forms, real life suggests that hate crimes can be essentially suppressed only by promoting values such as equality, respect for diversity and tolerance, and by continuous education of public about the danger of hate crimes.
Woods, Clinton, M.
Approved for public release; distribution is unlimited Cyberspace has become an essential component of modern militaries. As this dependency grows, militaries who exploit this dependency may be able to hurt their adversaries within cyberspace to coerce them into a desirable action. This thesis will explore one particular use of cyber coercion, the use of cyber weapons to target supply chains, to study what methods may be best suited for cyber coercion. This thesis first looks at the possib...
Anderson, Robert S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Benjamin, Jacob [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wright, Virginia L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Quinones, Luis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Paz, Jonathan [Idaho National Lab. (INL), Idaho Falls, ID (United States)
A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.
Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.; Quinones, Luis; Paz, Jonathan
A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.
5. Combating Cyber Racism: Analisis Komparatif Terhadap Implementasi Protokol Tambahan Council of Europe Convention on Cybercrime Tentang Cyber Racism (CETS 189) Di Amerika Serikat Dan Australia Tahun 2012-2016
Charlina, Riani; Utama, Tri Cahya; Farabi, Nadia
In this globalization era, technological advances undeniably encouraged the developmentof the scope of crime along with the development of science. The phenomenon of crimecommitted in cyberspace, known as cybercrime, is one of the most dangerous crimes thatare currently faced by most people in the world. One of those crimes is racism incyberspace or what so-called cyber racism. The United States and Australia are the twolargest countries out of the Council of Europe member countries which com...
Al-Ali, A. R.; Gupta, Ragini; Nabulsi, Ahmad Al
Empowered by the recent development in single System-on-Chip, Internet of Things, and cloud computing technologies, cyber physical systems are evolving as a major controller during and post the manufacturing products process. In additional to their real physical space, cyber products nowadays have a virtual space. A product virtual space is a digital twin that is attached to it to enable manufacturers and their clients to better manufacture, monitor, maintain and operate it throughout its life time cycles, i.e. from the product manufacturing date, through operation and to the end of its lifespan. Each product is equipped with a tiny microcontroller that has a unique identification number, access code and WiFi conductivity to access it anytime and anywhere during its life cycle. This paper presents the cyber physical systems architecture and its role in manufacturing. Also, it highlights the role of Internet of Things and cloud computing in industrial manufacturing and factory automation.
Ana Flávia Belchior Andrade
Full Text Available Blood is the most common body fluid found at crime scenes. One-step presumptive tests have been designed as a rapid immunological test for the qualitative detection of human hemoglobin in stool samples (faecal occult blood their usefulness for forensic purposes has been demonstrated before. In this study we compare Hexagon OBTI kit and FOB One-step Bioeasy kit sensitivity in the analysis of diluted blood samples. With Hexagon OBTI, positive test results are achieved in whole blood dilutions up to 1:1.000. Sensitivity decreased with aged samples, if samples were not stored under low temperatures regardless of which presumptive test is used. Whole blood tests must take into consideration that “hook” effect may interfere. Comparing both tests, OBTI Hexagon Kit is more sensible to detect diluted blood, showing a wider detection window in all conditions. This is interesting when analyzing forensic samples as forensic analysts usually do not know about the history of the analyzed sample before its collection.
weekly after-school club for girls K-5, CyberCats was built around a high social interaction foundation that uses game theory . Girls work together... owners , will need to decide where to invest and prioritize their efforts based on these recommendations. Team CyberWorx – Grant-writing to leverage
Full Text Available The digital era started when the internet technology spread to the developing countries including Indonesia. The flourish of cyber literature leads to the debate on the quality of the work of literature. Above all, the existence of literature sites (cyber literature becomes an important alternative for writers and literary activist in Indonesia.
The phrase cyber terror appeared for the first time in the mid-eighties. According to several sources, Barry C. Collin, a senior person research fellow of the Institute for Security and Intelligence in California, defined cyber terror at that time as “the convergence of cybernetics and terrorism”—an
initial assessment framework developed under this research proposal, there a number of important assumptions. These assumptions are as follows: • A...https://www.cybercompex.org/topic/cyber-9-12-project 8 0.1% 8 0.8% 536 0.3% 97. https://www.cybercompex.org/event/2016-cyber-security- brainstorm 8 0.1
Full Text Available Victimisation of women through cyber stalking is one of the most serious crimes against women. Many countries including India have developed laws regulating cyber stalking. This article argues that since both, restorative justice (RJ and therapeutic jurisprudence (TJ are victim oriented, the issue of cyber stalking of women may be dealt with by RJ process and the laws in this regard must be analysed by the legal actors with a background in RJ and TJ philosophy. India had earlier taken up therapeutic punishment policy to enforce rights of the accused. But the modern principles of TJ have still not been considered in the RJ background in cyber stalking cases. This article therefore examines whether RJ and TJ principles can replace retributive principles for cyber stalking victimisation. It also examines the Indian cyber stalking law from RJ and TJ perspectives to assess its effectiveness for victims.
Dan Constantin TOFAN
Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.
Full Text Available Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat
Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.
Matanga, FK. Vol 39, No 2 (2009) - Articles The Challenges Facing the International Criminal Court in Prosecuting Cases of Genocide, Crimes Against Humanity and War Crimes Abstract. ISSN: 1995-641X. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about ...
Porter, J. Vol 47 (2014) - Articles Visualising Property Crime in Gauteng: Applying GIS to crime pattern theory. Abstract PDF. ISSN: 1991-3877. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use ...
Jason Healey, ed., A Fierce Domain : Conflict in Cyberspace, 1986 to 2012, Kindle (Vienna, VA: Cyber Conflict Studies Association, 2013), Loc 178. 6...Making Sense of Cyber Course” (Max, Air War College Term 1 Elective (AY17)); Healey, A Fierce Domain , Loc 5209-5281. 51. P. W. Singer, Cybersecurity...Inside Cyber Warfare, 5. 56. Ibid., 5; 121-130. 57. Joint Chiefs of Staff, “JP - 1-02,” 241. 58. Healey, A Fierce Domain , Loc 468. 59. Ibid., Loc 489
Afifi, Shereen; GholamHosseini, Hamid; Sinha, Roopak
Support Vector Machine (SVM) is a common classifier used for efficient classification with high accuracy. SVM shows high accuracy for classifying melanoma (skin cancer) clinical images within computer-aided diagnosis systems used by skin cancer specialists to detect melanoma early and save lives. We aim to develop a medical low-cost handheld device that runs a real-time embedded SVM-based diagnosis system for use in primary care for early detection of melanoma. In this paper, an optimized SVM classifier is implemented onto a recent FPGA platform using the latest design methodology to be embedded into the proposed device for realizing online efficient melanoma detection on a single system on chip/device. The hardware implementation results demonstrate a high classification accuracy of 97.9% and a significant acceleration factor of 26 from equivalent software implementation on an embedded processor, with 34% of resources utilization and 2 watts for power consumption. Consequently, the implemented system meets crucial embedded systems constraints of high performance and low cost, resources utilization and power consumption, while achieving high classification accuracy.
Wang, Zhuocai; Xu, Xiangmin; Ding, Xiaojun; Xiao, Hui; Huang, Yusheng; Liu, Jian; Xing, Xiaofen; Wang, Hua; Liao, D Joshua
Identification of prostatic calculi is an important basis for determining the tissue origin. Computation-assistant diagnosis of prostatic calculi may have promising potential but is currently still less studied. We studied the extraction of prostatic lumina and automated recognition for calculus images. Extraction of lumina from prostate histology images was based on local entropy and Otsu threshold recognition using PCA-SVM and based on the texture features of prostatic calculus. The SVM classifier showed an average time 0.1432 second, an average training accuracy of 100%, an average test accuracy of 93.12%, a sensitivity of 87.74%, and a specificity of 94.82%. We concluded that the algorithm, based on texture features and PCA-SVM, can recognize the concentric structure and visualized features easily. Therefore, this method is effective for the automated recognition of prostatic calculi.
Wang, Zhuocai; Xu, Xiangmin; Ding, Xiaojun; Xiao, Hui; Huang, Yusheng; Liu, Jian; Xing, Xiaofen; Wang, Hua; Liao, D. Joshua
Identification of prostatic calculi is an important basis for determining the tissue origin. Computation-assistant diagnosis of prostatic calculi may have promising potential but is currently still less studied. We studied the extraction of prostatic lumina and automated recognition for calculus images. Extraction of lumina from prostate histology images was based on local entropy and Otsu threshold recognition using PCA-SVM and based on the texture features of prostatic calculus. The SVM classifier showed an average time 0.1432 second, an average training accuracy of 100%, an average test accuracy of 93.12%, a sensitivity of 87.74%, and a specificity of 94.82%. We concluded that the algorithm, based on texture features and PCA-SVM, can recognize the concentric structure and visualized features easily. Therefore, this method is effective for the automated recognition of prostatic calculi. PMID:21461364
Full Text Available Criminal acts of corruption in Indonesia is widespread within the community. Its development continued to increase from year to year, the number of cases from both and the amount of the financial loss to the State, as well as in terms of the quality of the criminal acts carried out increasingly systematic in scope as well as entering all aspects of people's lives. The increased criminal acts of corruption which cannot be controlled would bring disaster not only to the life of the national economy but also, on the life of nation and State in General. Criminal acts of corruption were widespread and systematic as well a breach of the rights to social and economic rights of the community, and therefore all the criminal acts of corruption can no longer be classed as ordinary crimes, but rather has become an extraordinary crime. So in an effort can no longer be done on a regular, but prosecuted ways extraordinary.
Aleksandr G. Avdeiko
Full Text Available The article discusses the existing forms of realization of administrative-jurisdictional powers in the field of public order protection and crime prevention. The problems of organization of activity are analyzed of commissions on juvenile affairs and protection of their rights, the administrative commissions established in municipalities. The necessity of the creation of municipal militia as a solution to the issue of the realization of local self-government bodies of administrative-jurisdictional powers
Kaitlyn N. Ryan
Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.
Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.; Fluckiger, Jerry D.
Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is to examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.
Goychayev, Rustam [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carr, Geoffrey A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Weise, Rachel A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Donnelly, David A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Clements, Samuel L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Benz, Jacob M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rodda, Kabrena E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bartholomew, Rachel A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McKinnon, Archibald D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Andres, Richard B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, this paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.
Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.
This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).
Military Force (AUMF).64 According to HR 1540, the SECDEF was also granted de facto Title 10 CNO authority when defending against cyber attacks on DoD...efficacy and pace of CT operations within the AOH. The authorities to conduct CT Cyber Attacks (CCA) should be retained by the AOH theater commander...to U. S. national security, the other being the Russian nuclear threat.7 Additionally, the intelligence community (IC) writ large considers cyber
South African Crime Quarterly is an inter-disciplinary peer-reviewed journal that promotes professional discourse and the publication of research on the subjects of crime, criminal justice, crime prevention, and related matters including state and non-state responses to crime and violence. South Africa is the primary focus for ...
Bennett, Patrick; Ouazad, Amine
We use a detailed employer-employee data set matched with detailed crime information (timing of crime, fines, convictions, crime type) to estimate the impact of job loss on an individual's probability to commit crime. We focus on job losses due to displacement, i.e. job losses in firms losing...
Part of the problem appears to be that the police do not have sufficient crime intelligence about house robbers. This article focuses on the value of incarcerated offenders of house robberies as an additional source of crime intelligence to the police on the basis of research conducted by the author in Gauteng in 2007.
Snell, Joel C.; Wakefield, William O.
Attempts to analyze crime control program development and relate it to several independent variables which might be associated. Results show that often crime control programs were developed at the Associate degree level and appear to duplicate or approximate the police training academies. (Author)
The number of hate crimes reported to the police is rising sharply, in part because increased awareness has prompted more victims and witnesses to come forward. This article explains how nurses are taking steps to identify such crimes and prevent them happening in the first place. The panel opposite offers some practical advice on how to raise concerns with the police and other authorities.
Ruppar, Carrie Aliene
The increase in online activities which involve peopleâ s identification information means that identity theft has become a widespread computer security issue. Identity theft is defined as the misuse of personal information and identity. To address this problem, an Information Assurance training tool, such as CyberCIEGE, can be used for user awareness and education. This thesis incorporated current research on identity theft attacks and prevention techniques into a customized scenario defini...
Yen, John; McNeese, Michael; Mullen, Tracy; Hall, David; Fan, Xiaocong; Liu, Peng
Intelligence workers such as analysts, commanders, and soldiers often need a hypothesis reasoning framework to gain improved situation awareness of the highly dynamic cyber space. The development of such a framework requires the integration of interdisciplinary techniques, including supports for distributed cognition (human-in-the-loop hypothesis generation), supports for team collaboration (identification of information for hypothesis evaluation), and supports for resource-constrained information collection (hypotheses competing for information collection resources). We here describe a cognitively-inspired framework that is built upon Klein’s recognition-primed decision model and integrates the three components of Endsley’s situation awareness model. The framework naturally connects the logic world of tools for cyber situation awareness with the mental world of human analysts, enabling the perception, comprehension, and prediction of cyber situations for better prevention, survival, and response to cyber attacks by adapting missions at the operational, tactical, and strategic levels.
Federal Laboratory Consortium — The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare, to facilitate the sharing of expertise...
Cyber Warfare is widely touted to be the next generation of warfare. As America's reliance on automated systems and information technology increases, so too does the potential vulnerability to cyber attack...
Carataș Maria Alina
Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.
Erdal KARAKAŞ; Sabri KARADOĞAN; Handan ARSLAN
Crime maps show crime density values and locations where crime have accured. For this reason it had been easy to examine the spatial distribution of crime locations with crime maps. There for crime maps have long been part of the process to crime analysis. In this study, the crime of home burglary was mapped with respect to general areal distribution by GIS (Geographic Information System) in the city of Elazig The distribution of the crime was handled considering the parameters such as month,...
Identifying factors behind countries weakness to cyber - attacks is an important step towards addressing these weaknesses at the root level. For...the lowest rates of cyber - attacks . This is surprising given the bad cyber reputation of some African countries such as Nigeria. Our research has many policy implications.
Johnson, Thomas A
The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio
Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism phenomena in line with the principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in the context of cyber attacks events in attempt to establish a legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.
Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line with principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none-European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in context of cyber-attacks events in attempt to establish legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber-attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.
Full Text Available The new Criminal Code of Romania regulates in Title XI of its Special Part the crimes against the combat capability of the military forces. Under this title, Chapter I is dedicated to the crimes committed by the military and defines the crime of unjustified absence. In this study, the author analysed the specific elements of this crime, including: the specific legal object - military discipline, the field of the active subject and the essential requirements imposed by its objective side.
Chukwuere, Joshua Ebere. Vol 15, No 4 (2017) - Articles Cyber bullying of female students: an exploration of literature study. Abstract. ISSN: 1596-9231. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...
Chigozie-Okwum, Chioma C. Vol 6, No 1 (2017) - Articles Computer forensics investigation; implications for improved cyber security in Nigeria Abstract PDF. ISSN: 2227-5444. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners ...
Ugboaja, Samuel G. Vol 6, No 1 (2017) - Articles Computer forensics investigation; implications for improved cyber security in Nigeria Abstract PDF. ISSN: 2227-5444. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and ...
Alese, B.K.. Vol 36, No 4 (2017) - Research papers. A review of game theory approach to cyber security risk management. Abstract PDF. ISSN: 2467-8821. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of ...
Ikemelu, CRK. Vol 3, No 3 (2014) - Articles Data Mining for Cyber Security Abstract PDF. ISSN: 2227-5444. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use · Contact AJOL · News. OTHER ...
When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)
Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management. It provides a breakdown of the main risks involved and shows you how to manage them. Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject.
Author Guidelines. SACQ is a quarterly journal published by the Crime and Justice Programme of the Institute for Security Studies. The journal is published in hard copy and is available on our website: www.issafrica.org. The journal is widely read nationally and internationally by criminal justice practitioners, researchers ...
Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott
Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.
Friis, Karsten; Ringsmose, Jens
hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out...... the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions: do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed......?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims?; and, how does the advent of conflict in cyberspace challenge our established legal framework? By asking important strategic questions on the theoretical, strategic, ethical and legal implications...
Bennett, Patrick; Ouazad, Amine
This paper matches a comprehensive Danish employer-employee data set with individual crime information (timing of offenses, charges, convictions, and prison terms by crime type) to estimate the impact of job displacement on an individual’s propensity to commit crime. We focus on displaced...... no significantly increasing trend prior to displacement; and the crime rate of workers who will be displaced is not significantly higher than the crime rate of workers who will not be displaced. In contrast, displaced workers’ probability to commit any crime increases by 0.52 percentage points in the year of job...
Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin
Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.
Cunningham, Cindy C.; Peloquin, Tracy D.
Since late 1996 the Forensic Identification Services Section of the Ontario Provincial Police has been actively involved in state-of-the-art image capture and the processing of video images extracted from crime scene videos. The benefits and problems of this technology for video analysis are discussed. All analysis is being conducted on SUN Microsystems UNIX computers, networked to a digital disk recorder that is used for video capture. The primary advantage of this system over traditional frame grabber technology is reviewed. Examples from actual cases are presented and the successes and limitations of this approach are explored. Suggestions to companies implementing security technology plans for various organizations (banks, stores, restaurants, etc.) will be made. Future directions for this work and new technologies are also discussed.
Gao, D.; Zhang, Y.; Qu, Z.; Sadighi, K.; Coffey, E.; LIU, Q.; Hannigan, M.; Henze, D. K.; Dick, R.; Shang, L.; Lv, Q.
To investigate and predict the exposure of ozone and other pollutants in urban areas, we utilize data from various infrastructures including EPA, NOAA and RIITS from government of Los Angeles and construct statistical models to conduct ozone concentration prediction in Los Angeles areas at finer spatial and temporal granularity. Our work involves cyber data such as traffic, roads and population data as features for prediction. Two statistical models, Support Vector Machine (SVM) and Long Short-term Memory (LSTM, deep learning method) are used for prediction. . Our experiments show that kernelized SVM gains better prediction performance when taking traffic counts, road density and population density as features, with a prediction RMSE of 7.99 ppb for all-time ozone and 6.92 ppb for peak-value ozone. With simulated NOx from Chemical Transport Model(CTM) as features, SVM generates even better prediction performance, with a prediction RMSE of 6.69ppb. We also build LSTM, which has shown great advantages at dealing with temporal sequences, to predict ozone concentration by treating ozone concentration as spatial-temporal sequences. Trained by ozone concentration measurements from the 13 EPA stations in LA area, the model achieves 4.45 ppb RMSE. Besides, we build a variant of this model which adds spatial dynamics into the model in the form of transition matrix that reveals new knowledge on pollutant transition. The forgetting gate of the trained LSTM is consistent with the delay effect of ozone concentration and the trained transition matrix shows spatial consistency with the common direction of winds in LA area.
Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.
Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public
Full Text Available The article presents the basic rules for constructing and training neural networks called the Support Vector Machine method as well as possible applications for this kind of network. SVM networks are mainly used for solving tasks of classifying linearly and non-linearly separable data and regression. However, in recent years more applications have been found for them. The networks also solve such problems as the recognition of signals and images as well as speech identification.
Agger, Gunhild; Waade, Anne Marit
Recent developments in the relationship between media and crime are analyzed, taking both fiction and journalism in account......Recent developments in the relationship between media and crime are analyzed, taking both fiction and journalism in account...
Roč. 13, č. 4 (2012), s. 447-469 ISSN 1465-6485 Institutional support: RVO:67985998 Keywords : crime under transition * deterrence * economic s of crime Subject RIV: AH - Economic s Impact factor: 0.736, year: 2012
Li, Weihong; Liu, Lijuan; Gong, Weiguo
Support vector machine (SVM) has been proved to be a powerful tool for face recognition. The generalization capacity of SVM depends on the model with optimal hyperparameters. The computational cost of SVM model selection results in application difficulty in face recognition. In order to overcome the shortcoming, we utilize the advantage of uniform design--space filling designs and uniformly scattering theory to seek for optimal SVM hyperparameters. Then we propose a face recognition scheme based on SVM with optimal model which obtained by replacing the grid and gradient-based method with uniform design. The experimental results on Yale and PIE face databases show that the proposed method significantly improves the efficiency of SVM model selection.
Betts, Lucy R; Spenser, Karin A
The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.
Notably due to the development of the number of connected objects, nuclear installations, their supply chain and all the actors of the chain value are exposed to cyber risks, even if a recent study noticed that successful cyber attacks involving nuclear plants are rare, but real. Thus, the threat is actual and growing, and the IAEA is already working with Interpol on this issue. The author then describes how French actors (EDF, Areva, CEA) have introduced cyber-resilience to better anticipate and identify actual threats and critical vulnerabilities in order to protect infrastructures. He comments some strengthened regulatory measures introduced for the French nuclear sector, and continuous improvements brought in the field of cyber security. He shows that handling these risks is also an opportunity to develop crisis management tools through the development of a specific know-how which also has an industrial value
Zar Rokh, Ehsan; Radmanesh, Mansour
The most primeval crimes in all countries are crimes against property such as: Burglary, Larceny, Arson, Embezzlement, False pretenses, Extortion, forgery, fraud, robbery, and etc these crimes engender when ownership existed. Lord can do any possession in his/her property .If anyone trespasses to another one ownership prevailing law punishment him/her. Also we define these crimes in Islamic criminal law; because Islamic rules are strange and prober must study very hard to understand ...
Stytz, Martin R.; Banks, Sheila B.
Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber
Although juvenile crime rates have not changed significantly in the last five years, the juvenile courts' ability to handle crime has deteriorated. To treat the problem of juvenile crime effectively requires intervention at the earliest sign of delinquency and an assessment of the juvenile courts and school system. (AM)
This paper tests whether being convicted of a crime affects marriage market outcomes. While it is relatively well documented that crime hurts in terms of reduced future income, there has been little systematic analysis on the association between crime and marriage market outcomes. This paper expl...
affect one’s cyber system by searching for viable attack plans1, and examining its effect on the system. It is a labour - intensive exercise as it...Both Satisfaction and Optimization Problems,” AI Magazine, vol. 22, no. 3, pp. 85-87, 2001.  S. Milton, Machine Learning methods for
Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.
On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOE’s Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.
Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.
.... A variety of multi-step cyber attacks were perpetrated against the target network each of which typifies a current-day real-world attack. The preliminary results presented here represent those available at conclusion of the experiment process by BBN.
Ducheine, P.; Osinga, F.; Soeters, J.
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the military. This manmade and virtual sphere brings along opportunities and threats. In this book, academics of the Netherlands Defence Academy as well as specialists and military professionals from other
In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)
Giacobe, Nicklaus A.
The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.
King-Close, Alexandria Marie
This thesis is a gender analysis of cyber war. Cyber war is a relatively recent domain within the context of international conflict. Thus far, neither a gender analysis of cyber warfare, nor of those who carry out cyber warfare—in other words cyber warriors, seems to have yet been conducted. Though existing literature discusses many other aspects of cyber war, it lacks any significant focus on gender analysis or gender perspective, if it mentions gender aspects at all. Furthermore, little ana...
This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers
Full Text Available .0 Kovelin Naidoo 2 LAY OF THE LAND ORGANISED CRIME Background + Context World’s first encrypted wireless Communication network Real world innovation: Narco submarines 8 tons on board minimum 5 NEXT GENERATION MALWARE PAY...
Kelic, Andjelka; Campbell, Philip L
The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.
The new curricula envisaged should expose students to courses which create opportunities for skill acquisition and entrepreneurship promotion, and broaden access to information and communication technology which encompass all computer-based systems such as tele-conferencing, video-conferencing and the Internet ...
Full Text Available Abstrak Menurut hukum internasional, negara memiliki batas-batas tertentu dalam menerapkan yurisdiksi untuk kasus yang melibatkan kepentingan negara lain. Salah satu batas tersebut dalam bentuk kewajiban setiap negara untuk menghindari kesulitan negara lain dalam upaya menerapkan yurisdiksi. Hukum Indonesia yang mengatur cybercrime adalah Undang-undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik ( UU ITE, bagian mengatur yurisdiksi yang bagian ke-2 mencakup dasar teritorial subjektif bagi setiap orang melakukan cybercrime dan dikualifikasi berbahaya di Indonesia . Namun, dalam prakteknya, hal ini sulit untuk dilakukan jika kejahatan dilakukan dari luar Indonesia karena belum tentu setiap negara akan menyampaikan, meskipun UU ITE telah mengikuti ketentuan substantif dalam Konvensi tentang cybercrime,kecuali Indonesia ikut meratifikasi Konvensi cybercrime. Keuntungan Indonesia meratifikasi, Indonesia dapat menjalin kerjasama dengan peserta dalam hal kasus cybercrime yang merugikan Indonesia terutama jika pelaku melakukan cybercrime di luar wilayah Indonesia, posisi Indonesia dapat mengajukan ekstradisi terhadap pelaku akan menjadi lebih kuat.Kata kunci: cybercrime, yurisdiksi, hukum internasional
Full Text Available „Smart Home: Hacker übernehmen Kontrolle über Thermostat“,„Medjacking – Attacke auf Herzschrittmacher“, „Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid“, „Ransomware: Erpressung per Lösegeld-Trojaner“, „Tesla’s Self-Driving System Cleared in Deadly Crash.“ Schlagzeilen wie diese beschreiben den digitalisierten Täter der heutigen Zeit. Die Liste der Beispiele an modernen Straftaten lässt sich zwanglos erweitern durch Phänomene wie Online-Pornographie, Online-Glückspiel und Geldwäsche, digitale Erpressung, Cybermobbing und überhaupt Hate speech im Internet oder durch Eingriffe in die Privatsphäre über das Internet. Wie stets, wenn der technische Fortschritt für den Einzelnen und die Gesellschaft Vorteile bringt, zeigt sich auch bei der fortschreitenden Digitalisierung die Kehrseite der Medaille, nämlich der Kriminelle, der die neu eröffneten Möglichkeiten zu verpönten Zwecken nutzt. Was der solcherart digitalisierte Täter für das gerichtliche Strafrecht bedeutet, möchte ich im Folgenden exemplarisch beleuchten.
Washingtonis toimunud iga-aastasel Trilateraalse Komisjoni konverentsil kutsus president Toomas Hendrik Ilves NATOt ja Euroopa Liitu üles koostööle küberkaitse arendamisel. Töövisiit Ameerika Ühendriikidesse 07.04.2011 - 10.04.2011
Novotny, Jon M.; Meehan, A.; Schulte, D.; Manes, Gavin W.; Shenoi, Sujeet
Sexually explicit Internet chat rooms are increasingly used by pedophiles to reach potential victims. Logging and linking suspects to chat room conversations and e-mails exchanged with undercover detectives are crucial to prosecuting travelers, i.e., pedophiles who travel across state lines to engage in sexual acts with minors. This paper describes two tools, a chat room monitor and a remote fingerprinter, for acquiring and preserving evidence. The chat room monitor logs online communications as well as screen images and keystrokes of the undercover detective. stored to allow the chronological reconstruction and replay of the investigation. The remote fingerprinter uses sophisticated scanning techniques to capture and preserve a unique fingerprint of the suspect's computer over the Internet. Once the suspect's computer is seized, it is scanned again; matching this new fingerprint with the remotely acquired fingerprint establishes that the suspect's computer was used to communicate with the detective.
Dec 1, 2016 ... simply an individual who is willing to risk investing time and money in a business activity that has the potential to make a profit or incur loss. More specifically .... This desire brings about the greatest benefits and is often the greatest motivator. As small ..... environment_677 23/05/2014. Ihekoronye, A.I.(1993).
Bigo, D.; Boulet, G.; Bowden, C.; Carrera, S.; Jeandesboz, J.; Scherrer, A.
This study addresses the challenges raised by the growing reliance on cloud computing. It starts by investigating the issues at stake and explores how the EU is addressing the identified concerns. The study then examines the legal aspects in relation to the right to data protection, the issues of
Full Text Available The aim of the author was to discuss an application of data mining and statistical methods to recidivism prediction. There was analysed a binary classification problem where the goal was to predict if a prisoner will be arrested for a certain type of crime within one year of being released from prison. There were compared different models such as neural network, classification tree, logistic regression and SVM. General accuracy of all the models exceeded 70% correctly classified instances, but all of the analysed classifiers were characterized by high “false negatives” ratio and so they would be useless in practice.
Gallaher, Michael P; Rowe, Brent R; Rogozhin, Alex V; Link, Albert N
.... However, few organizations attempt such analysis for their cyber security mechanisms. Key performance and evaluation metrics are not available, so organizations rely on qualitative assessments...
Kott, Alexander; Erbacher, Robert F
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th
Darkner, Sune; Clemmensen, Line Katrine Harder
classifier solution, compared to the SVM i.e. reduces variance and improves classification rates. We present a quantitative measure of the information level contained in the pairing and test the method on simulated as well as a high-dimensional paired data set of ear-canal surfaces.......We propose a generalized data driven constraint for support vector machines exemplified by classification of paired observations in general and specifically on the human ear canal. This is particularly interesting in dynamic cases such as tissue movement or pathologies developing over time....... Assuming that two observations of the same subject in different states span a vector, we hypothesise that such structure of the data contains implicit information which can aid the classification, thus the name data driven constraints. We derive a constraint based on the data which allow for the use...
Nov 23, 2011 ... began to use computational approaches, particularly machine learning methods to identify pre-miRNAs (Xue et al., 2005; Huang et al., 2007; Jiang et al., 2007). Xue et al. (2005) presented a support vector machine (SVM)- based classifier called triplet-SVM, which classifies human pre-miRNAs from pseudo ...
Full Text Available Environmental crime is a serious and growing international problem, and one which takes many different forms. It is not limited to criminals polluting the air, water and land and pushing commercially valuable wildlife species closer to extinction; it can also include crimes which speed up climate change, destroy fish stocks, annihilate forests and exhaust essential natural resources. These crimes can have a harmful impact on the economies and security of multiple nations, in some cases they may even threaten the very existence of a country or people. Furthermore, a significant proportion of both wildlife crime and pollution crime cases point to the involvement of organized crime networks. This is evidenced by the detailed planning of operations, substantial financial support, the careful management of international shipments and massive profits. Still, to date, transnational environmental crime has been poorly attended to by the transnational organised crime and transnational policing discourse. National and international institutions have prioritised other forms of organised crime, giving little thought to the nuances of environmental crime and how they should be reflected in policing. Intention of this paper is to point out the importance of international cooperation and to point out the its good examples.
Adankon, Mathias M; Cheriet, Mohamed; Biem, Alain
Bayesian reasoning provides an ideal basis for representing and manipulating uncertain knowledge, with the result that many interesting algorithms in machine learning are based on Bayesian inference. In this paper, we use the Bayesian approach with one and two levels of inference to model the semisupervised learning problem and give its application to the successful kernel classifier support vector machine (SVM) and its variant least-squares SVM (LS-SVM). Taking advantage of Bayesian interpretation of LS-SVM, we develop a semisupervised learning algorithm for Bayesian LS-SVM using our approach based on two levels of inference. Experimental results on both artificial and real pattern recognition problems show the utility of our method.
Yan Zhi-gang; Du Pei-jun; Guo Da-zhi [China University of Science and Technology, Xuzhou (China). School of Environmental Science and Spatial Informatics
The support vector machine (SVM) model was introduced to analyse the headstrean of water inrush in a coal mine. The SVM model, based on a hydrogeochemical method, was constructed for recognising two kinds of headstreams and the H-SVMs model was constructed for recognising multi- headstreams. The SVM method was applied to analyse the conditions of two mixed headstreams and the value of the SVM decision function was investigated as a means of denoting the hydrogeochemical abnormality. The experimental results show that the SVM is based on a strict mathematical theory, has a simple structure and a good overall performance. Moreover the parameter W in the decision function can describe the weights of discrimination indices of the headstream of water inrush. The value of the decision function can denote hydrogeochemistry abnormality, which is significant in the prevention of water inrush in a coal mine. 9 refs., 1 fig., 7 tabs.
networks. The Board assembled a Task Force composed of national leaders in informationtechnology (IT) and cyber security. The Task Force met from...the ability to conduct cyberspace operations.7 For example, theability to conduct command and control of forces depends on the ability to pass ...20th of each month >90% 70%-89% ា%# reflects systems notcurrent ɚ.6 (Minor) =>2.5 - ɛ.5 (Moderate) =>3.6 (Critical) How Criteria 100% Pass
USCC activities to others • % satisfied with USCC Sponsored site • % satisfied with their Cyber Career Collection Tools • Mango and other USCC...1 Foreign Language 0 1 1 0 1 3 History 0 1 0 1 1 3 Math 8 15 7 7 13 50 Music 1 0 1 0 0 2 Networking 1 0 1 0 0 2 Philosophy 1 0 0 0 0 1 Physics
Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares
In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...
Full Text Available The author emphasizes the most significant difficulties and disagreements in determining the notion of organized crime, which, on one hand, come as a result of a complexity and dynamism of a contemporary organized crime, and on the other hand, may lead to passing the inadequate legislation and/or the failure of actions against the organized crime. Pointing out to the differences between contemporary organized crime and theoretical definitions of it from the first decades of the 20th century, the author concludes that the answer to the organized crime should be systematic, and need to include the rule of law and the principles of division and control of state power. The author suggests that the changes are necessary within the present criminal legislature of Serbia. In these changes the emphasis need to be on the protection of victims rather than on special legal solutions and special court, prosecution and police units for suppression of organized crime.
Physics is playing a significant role, particularly in Europe and North America, both as an aid to detect and prevent crime and also to assist in the provision of more precise information about crimes committed. Advances have resulted from fundamental studies in several fields. Among methods described are those of neutron activation analysis and proton microbeam X-ray production which show promise in the field of forensic science where the detection of minute quantities of trace elements may be of significance. (author)
Full Text Available The current Internet combines very complex communications infrastructures, while connecting users globally and at the same time creating information cyberspace systems. Large companies such as Philips are working on communications technologies that will facilitate fully automated households (i.e., Cyber Homes. Today, people are using are using small digital pagers and phones with embedded computers and displays, palm-size computers such as Palm Pilot, notebook-size panel computers and wall-size displays. Current research and development trends in the field of Telecommunications and computing industries continues towards a human centric computing, smart spaces, smart devices, clothing, fully automated houses etc. This new technology creates environment where computers are everywhere and provide online access to information at any time to anyone. In this paper, the author discusses new technological trends directions in the Internet, E-commerce and Automation Industries, while presenting his own vision on application of ubiquitous computing in the future cyber home automation. In support of creating future fully automated cyber homes, the author promotes creation of interdisciplinary and multinational research and development teams world-wide.
Full Text Available In a Flash Mob (FM a group of people get together in the physical world perform an unpredicted act and disperse quickly. Cyber Flash Mob (CFM is the cyber manifestation of flash mob coordinated primarily using social media. Deviant Cyber Flash Mob (or, DCFM is a special case of CFM, which is categorized as the new face of transnational crime organizations (TCOs. The DCFM phenomenon can be considered as a form of a cyber-collective action that is defined as an action aiming to improve group's conditions (such as, status or power. In this paper, we conduct a conceptual analysis of the DCFMs and model the factors that lead to success or failure with groundings in collective action and collective identity formation theories. Mathematical constructs of hypergraph are leveraged to represent the complex relations observed in the DCFM social networks. The model's efficacy is demonstrated through a test scenario.
Kleemans, Edward R.; Soudijn, Melvin R J; Weenink, Anton W.
This chapter explores the consequences of cross-border crime for situational crime prevention. Many types of organised crime involve international smuggling activities – such as drug trafficking, money laundering, smuggling illegal immigrants, and other transnational illegal activities. Based on
Rogers, Gary; Ashford, Tina
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
RESILIA™ Cyber Resilience Best Practices offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.
This research investigates the emotional and physiological effects of cyber bullying on the university students. The primary objective of this investigation is to identify the victims of cyber bullying and critically analyze their emotional state and frame of mind in order to provide them with a workable and feasible intervention in fighting cyber…
This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the
Full Text Available In victimology, fear of crime is understood as an emotional response to the perceived threat of crime. Fear of crime has been found to be affected by several variables besides local crime rates and personal experiences with victimization. This study examines the relationship between religion and fear of crime, an underexplored topic in the criminological literature. This gap is rather surprising given the central role religion has been found to play in shaping the attitudes and perceptions of congregants. In particular, religion has been found to foster generalized trust, which should engender lower levels of distrust or misanthropy, including that which is directed towards a general fear of crime. OLS regression was performed using data from the West Georgia Area Survey (n = 380. Controlling for demographic, community involvement, and political ideology variables, frequency of religious attendance was significantly and negatively associated with fear of property crime. This relationship remained even after a perceived neighborhood safety variable was introduced to the model. However, religious attendance was not significantly related to fear of violent crime, and religious orientation was unrelated to fear of property and violent crime. These results suggest that religious involvement conditionally reduces fear of crime, and the authors recommend that future research explore relationships between religion and fear of crime.
Dağlar, Murat; Argun, Uğur
As essential apparatus in crime analysis, crime mapping and Geographical Information Systems (GIS) are being progressively more accepted by police agencies. Development in technology and the accessibility of geographic data sources make it feasible for police departments to use GIS and crime mapping. GIS and crime mapping can be utilized as devices to discover reasons contributing to crime, and hence let law enforcement agencies proactively take action against the crime problems before they b...
Eric Cornelius; Mark Fabro
Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these
Denise Tellbach; Yan-Fu Li
The subject of cyber-security and therefore cyber-attacks on smart grid (SG) has become subject of many publications in the last years, emphasizing its importance in research, as well as in practice. One especially vulnerable part of SG are smart meters (SMs). The major contribution of simulating a variety of cyber-attacks on SMs that have not been done in previous studies is the identification and quantification of the possible impacts on the security of SG. In this study, a simulation model...
Full Text Available Facial feature tracking and facial actions recognition from image sequence attracted great attention in computer vision field. Computational facial expression analysis is a challenging research topic in computer vision. It is required by many applications such as human-computer interaction, computer graphic animation and automatic facial expression recognition. In recent years, plenty of computer vision techniques have been developed to track or recognize the facial activities in three levels. First, in the bottom level, facial feature tracking, which usually detects and tracks prominent landmarks surrounding facial components (i.e., mouth, eyebrow, etc, captures the detailed face shape information; Second, facial actions recognition, i.e., recognize facial action units (AUs defined in FACS, try to recognize some meaningful facial activities (i.e., lid tightener, eyebrow raiser, etc; In the top level, facial expression analysis attempts to recognize some meaningful facial activities (i.e., lid tightener, eyebrow raiser, etc; In the top level, facial expression analysis attempts to recognize facial expressions that represent the human emotion states. In this proposed algorithm initially detecting eye and mouth, features of eye and mouth are extracted using Gabor filter, (Local Binary Pattern LBP and PCA is used to reduce the dimensions of the features. Finally SVM is used to classification of expression and facial action units.
a seemingly benign TD hijacked the bootloader process of a host and planted a rootkit to gain persistence , the novelty of the first two attack...Multimedia. ACM. 2001, pp. 107–118.  Adam Coates et al. “Text detection and character recognition in scene images with unsupervised feature...NORTHEASTERN UNIVERSITY MASTERS THESIS USBeSafe: Applying One-Class SVM for Effective USB Event Anomaly Detection Author: Brandon L. DALEY Supervisor
Brower, Aaron M.; Carroll, Lisa
Objective: The authors aimed to clarify crime "movement" through the city of Madison to focus efforts to address consequences of student drinking. The authors examined all crime reported by police during the 2003 year. Methods: Using geographical information system (GIS) mapping and 2003 crime data from the University of…
Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott
Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.
Lin, Yuan; Yu, Hongzhi; Wan, Fucheng; Xu, Tao
Data Mining has important application value in today’s industry and academia. Text classification is a very important technology in data mining. At present, there are many mature algorithms for text classification. KNN, NB, AB, SVM, decision tree and other classification methods all show good classification performance. Support Vector Machine’ (SVM) classification method is a good classifier in machine learning research. This paper will study the classification effect based on the SVM method in the Chinese text data, and use the support vector machine method in the chinese text to achieve the classify chinese text, and to able to combination of academia and practical application.
The Chartered Society of Forensic Sciences Annual Conference 2018 Violent crime is a frequent occurrence in the UK, predominantly due to knives, with both urban and rural areas significantly impacted. Personal casework experience of the author has involved the forensic laboratory examination of bladed weapons from including murder, sexual offences, armed robberies, aggravated burglaries, wildlife crime, cold case reviews and terrorism offences. The September 2017 Crime Survey of England...
Full Text Available Ecological criminal offences, the most serious forms of harming and threatening of environment or its integral parts, represents a global phenomenon of great social hazard. They are often connected with organized transnational criminality, criminal offences against life and bodily integrity, corruption, tax evasion and discrimination. Disputable nature of the subject these incriminations protect imposes a question: “Who are the victims of ecological criminal offences - individuals, social groups, entire society or environment as value per se?” Perceiving ecological criminal offences as victimless crimes diminishes their importance and the circle of subjects interested to unveil, prove, prevent, suppress and impose punishments for these offences. Therefore, the author discusses the sustainability of the traditional, anthropocentrically defined term of victim in the context of biocentrism and its growing influence on criminal law, criminology and victimology. Attempting to determine whether ecological criminal offences represent victimless crimes, the author analyzes their term, characteristics and significance. Starting from the traditional definition of victim, she analyzes the term of “victimless crimes“ and its (unsustainability in the context of environmental crime, focusing on its most frequent victims and the necessity of their protection.
perverse incentive' to under record violent crime, particularly the various forms of assault.6 In effect this has rendered the SAPS statistics for inter-personal. * Gould and Burger are senior researchers in the Crime and Justice Programme of the ISS ...
Duong, Deborah; Turner, Robert; Selke, Karl
Like intergroup violence (Chap. 7) and insurgency (Chap. 8), crime and corruption are nearly inevitable companions of an international intervention. Both contribute to the reasons why the intervention occurs, and both may even grow and fester as side-effects of an intervention. Moreover, crime and corruption frequently serve as obstacles to a successful termination of an intervention.
Describes a project involving students in forensic science and crime prevention to improve their investigative skills using a DNA fingerprinting workshop and designing burglar alarms, investigating blood splatter patterns, investigating vehicle collisions, and researching crime prevention advice on the Internet. (YDS)
Hansen, Kim Toft
In Crime Stories: Criminalistic Fantasy and the Culture of Crisis in Weimar Germany, Todd Herzog – explicitly or implicitly – deals with different established myths about crime fiction, criminality and its cultural presumptions. It is generally quite seldom – as Herzog does – that the three...
Aigbovo & Eidenoje
Sep 8, 1971 ... government in Nigeria should be knowledgeable about crime theories so that they can fashion well ... single theory or definition can be exhaustive on the issue of crime.4 A major objective of criminological ...... parental kidnapping and kidnapping for sexual or slavery purposes). Yang63 adds a fourth ...
Roč. 13, č. 4 (2012), s. 447-469 ISSN 1465-6485 Institutional support: PRVOUK-P23 Keywords : crime under transition * deterrence * economic s of crime Subject RIV: AH - Economic s Impact factor: 0.736, year: 2012
Full Text Available We aimed to evaluate the specificity of 12 tumor markers related to colon carcinoma and identify the most sensitive index. Logistic regression and Bhattacharyya distance were used to evaluate the index. Then, different index combinations were used to establish a support vector machine (SVM diagnosis model of malignant colon carcinoma. The accuracy of the model was checked. High accuracy was assumed to indicate the high specificity of the index. Through Logistic regression, three indexes, CEA, HSP60 and CA199, were screened out. Using Bhattacharyya distance, four indexes with the largest Bhattacharyya distance were screened out, including CEA, NSE, AFP, and CA724. The specificity of the combination of the above six indexes was higher than that of other combinations, so did the accuracy of the established SVM identification model. Using Logistic regression and Bhattacharyya distance for detection and establishing an SVM model based on different serum marker combinations can increase diagnostic accuracy, providing a theoretical basis for application of mathematical models in cancer diagnosis.
Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.
The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.
Agatston, Patricia W; Kowalski, Robin; Limber, Susan
The aim of this study was to gain a better understanding of the impact of cyber bullying on students and the possible need for prevention messages targeting students, educators, and parents. A total of 148 middle and high school students were interviewed during focus groups held at two middle and two high schools in a public school district. The focus groups were approximately 45 minutes in length. Students were divided by gender and asked a series of scripted questions by a same-gender student assistance counselor. We found that students' comments during the focus groups suggest that students-particularly females-view cyber bullying as a problem, but one rarely discussed at school, and that students do not see the school district personnel as helpful resources when dealing with cyber bullying. Students are currently experiencing the majority of cyber bullying instances outside of the school day; however there is some impact at school. Students were able to suggest some basic strategies for dealing with cyber bullying, but were less likely to be aware of strategies to request the removal of objectionable websites, as well as how to respond as a helpful bystander when witnessing cruel online behavior. We conclude that school districts should address cyber bullying through a combination of policies and information that are shared with students and parents. Schools should include cyber bullying as part of their bullying prevention strategies and include classroom lessons that address reporting and bystander behavior.
Dzulkifli, Syarizul Amri; Salleh, Mohd Najib Mohd; Leman, A. M.
In a classification problem, where each input is associated to one output. Training data is used to create a model which predicts values to the true function. SVM is a popular method for binary classification due to their theoretical foundation and good generalization performance. However, when trained with noisy data, the decision hyperplane might deviate from optimal position because of the sum of misclassification errors in the objective function. In this paper, we introduce fuzzy in weighted learning approach for improving the accuracy of Support Vector Machine (SVM) classification. The main aim of this work is to determine appropriate weighted for SVM to adjust the parameters of learning method from a given set of noisy input to output data. The performance and customer rating in Quality Function Deployment (QFD) is used as our case study to determine implementing fuzzy SVM is highly scalable for very large data sets and generating high classification accuracy.
S Amarappa; Dr. S V Sathyanarayana
In all our day to day activities we will be classifying things based on situations and on our needs. Human beings do classification of any kind by their natural perception. Classifying data is a common task in machine learning which requires artificial intelligence. Support vector Machine (SVM) is a new technique suitable for binary classification tasks. SVMs are a set of supervised learning methods used for classification, regression and outliers detection. The SVM classifiers work for both...
Wang, Xibin; Wen, Junhao; Alam, Shafiq; Gao, Xiang; Jiang, Zhuo; Zeng, Jun
Accurate forecast of the sales growth rate plays a decisive role in determining the amount of advertising investment. In this study, we present a preclassification and later regression based method optimized by improved particle swarm optimization (IPSO) for sales growth rate forecasting. We use support vector machine (SVM) as a classification model. The nonlinear relationship in sales growth rate forecasting is efficiently represented by SVM, while IPSO is optimizing the training parameters ...
Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyber attacks, carried out with tools which are freely available on the Internet. Cyber Essentials is the UK Government's reaction to the proliferation of these attacks. It requires that organisations put basic security measures in place, enabling them to reliably counter the most common tactics employed by cyber criminals. From 1 October 2014, all suppliers bidding for a range of government ICT contracts - in particu
Yahner, Jennifer; Dank, Meredith; Zweig, Janine M; Lachman, Pamela
This study examined the overlap in teen dating violence and bullying perpetration and victimization, with regard to acts of physical violence, psychological abuse, and-for the first time ever-digitally perpetrated cyber abuse. A total of 5,647 youth (51% female, 74% White) from 10 schools participated in a cross-sectional anonymous survey. Results indicated substantial co-occurrence of all types of teen dating violence and bullying. Youth who perpetrated and/or experienced physical, psychological, and cyber bullying were likely to have also perpetrated/experienced physical and sexual dating violence, and psychological and cyber dating abuse. © The Author(s) 2014.
Full Text Available this article discusses the issues of optimization organization of identification of foreign public officials with the aim of countering legalization (laundering of criminal proceeds as well as the ways to improve identification of foreign public officials on the territory of the Russian Federation taking into account the Russian legislation.
Nizamani, Sarwat; Memon, Nasrullah
In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some...... reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10...... authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron data set, while 89.5% accuracy has been achieved on authors' constructed real email data set. The results on Enron data set have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1...
Adebanjo, Margaret Adewunmi
This paper examines crime and its management in Nigerian tertiary institutions. Tertiary institutions today have become arenas for crime activities such as rape, cultism, murder, theft, internet fraud, drug abuse, and examination malpractices. This paper delves into what crime is, and its causes; and the positions of the law on crime management.…
The cyber-physical system (CPS) is a relatively new interdisciplinary technology area that includes the general class of embedded and hybrid systems. CPSs require integration of computation and physical processes that involves the aspects of physical quantities such as time, energy and space during information processing and control. The physical space is the source of information and the cyber space makes use of the generated information to make decisions. This dissertation proposes an overall architecture of autonomous perception-based decision & control of complex cyber-physical systems. Perception involves the recently developed framework of Symbolic Dynamic Filtering for abstraction of physical world in the cyber space. For example, under this framework, sensor observations from a physical entity are discretized temporally and spatially to generate blocks of symbols, also called words that form a language. A grammar of a language is the set of rules that determine the relationships among words to build sentences. Subsequently, a physical system is conjectured to be a linguistic source that is capable of generating a specific language. The proposed technology is validated on various (experimental and simulated) case studies that include health monitoring of aircraft gas turbine engines, detection and estimation of fatigue damage in polycrystalline alloys, and parameter identification. Control of complex cyber-physical systems involve distributed sensing, computation, control as well as complexity analysis. A novel statistical mechanics-inspired complexity analysis approach is proposed in this dissertation. In such a scenario of networked physical systems, the distribution of physical entities determines the underlying network topology and the interaction among the entities forms the abstract cyber space. It is envisioned that the general contributions, made in this dissertation, will be useful for potential application areas such as smart power grids and
gkm-SVM is a sequence-based method for predicting and detecting the regulatory vocabulary encoded in functional DNA elements, and is a commonly used tool for studying gene regulatory mechanisms. Here we introduce new software, LS-GKM, which removes several limitations of our previous releases, enabling training on much larger scale (LS) datasets. LS-GKM also provides additional advanced gapped k-mer based kernel functions. With these improvements, LS-GKM achieves considerably higher accuracy than the original gkm-SVM. C/C ++ source codes and related scripts are freely available from http://github.com/Dongwon-Lee/lsgkm/, and supported on Linux and Mac OS X. email@example.com Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: firstname.lastname@example.org.
Buckleton, John; Bright, Jo-Anne; Walsh, Simon J
Guidance exists on how to count matches between samples in a crime sample database but we are unable to locate a definition of how to estimate a match rate. We propose a method that does not proceed from the match counting definition but which has a strong logic.
Full Text Available This study discovers how unemployment rate explains the changes in the crime rate tendency in Europe by the two-stage-least square regression. The crime rate in the Economic and Monetary Union (EMU area is found evidently more sensitive to unemployment than the non-EMU countries. The adoption of a common currency also strengthens the connections of the criminal problem among the EMU countries. We found the seriousness of the endogenous bias involved using the OLS methodology, so previous findings on the small effect of unemployment on crime rate obtained by employing the OLS methodology could be unreliable. Empirically, a one-percentage-point increase in unemployment increases the property crime by nearly 9% on average. The large unemployment effect implies that the increase in the unemployment rate that occurred after the financial crisis in 2008, followed by the European sovereign-debt crisis, may account for the trending increasing tendencies of the crime rate in Europe. The high unemployment effect revealed markedly different policy implications than those that have previously been considered in the literature. These findings suggest that the key determinants for governmental authorities in the EMU area successfully mitigating crime would greatly depend on how the governments resolve their economic recession.
Woś, Jarosław; Florkowski, Antoni; Zboralski, Krzysztof
Crimes in the military, as well as criminal behaviors in the civilian community are determined by multiple factors. However, in case of military crimes committed by soldiers on active duty, an important part of forensic psychiatric opinion, is to assess whether occurring mental disorder resulted in inability to perform military duties. was to investigate the psychopathological and psychosocial determinants of criminal behavior in soldiers who committed military crime. The study included 122 soldiers who committed military crime. Material for this study consisted of forensic psychiatric opinions formed on the order of military prosecutor and the military judicial authorities. The results indicate that military crimes are determined by multiple factors. In most cases, the criminal behavior was associated with personality disorder (70%), alcohol problems (43%) and psychoactive substance use (30%). Psychosocial factors analysis revealed more frequent behavioral problems during childhood and adolescence (51%), history of parental alcohol problem (31%) and previous criminal record (29%). Forensic psychiatric examinations revealed that military crimes are more frequent in soldiers on compulsory military service, and in those with personality disorder or/and alcohol problems.
Full Text Available A steady-state mathematical model is built in order to represent plant behavior under stationary operating conditions. A novel modeling using LS-SVR based on Cultural Differential Evolution with Ant Search is proposed. LS-SVM is adopted to establish the model of the net value of ammonia. The modeling method has fast convergence speed and good global adaptability for identification of the ammonia synthesis process. The LS-SVR model was established using the above-mentioned method. Simulation results verify the validity of the method.
K. Ackermann (Katrin); K. Ballantyne (Kaye); M.H. Kayser (Manfred)
textabstractLinking biological samples found at a crime scene with the actual crime event represents the most important aspect of forensic investigation, together with the identification of the sample donor. While DNA profiling is well established for donor identification, no reliable methods exist
Traditional Part-Time Soldiers C2 Command and Control METL Mission Essential Task List CEH Certified Ethical Hacker MI Guard’s Cyber Backbone Network CMF...16 RC Sources and Resourcing Authorities (12301-12304) .......................................................... 16 End...terrorism and it received the highest priority for allocation of intelligence resources . In 2013, the Director National Intelligence (DNI) identified
Martin, Dominique E; Van Assche, Kristof; Domínguez-Gil, Beatriz; López-Fraga, Marta; Budiani-Saberi, Debra; Lavee, Jacob; Tibell, Annika; Moazam, Farhat; Muller, Elmi; Danovitch, Gabriel M; Codreanu, Igor; Naicker, Saraladevi; Al Rukhaimi, Mona; McGuinness, Sheelagh; Bakr, Mohamed A; Moniruzzaman, Monir; Capron, Alexander M; Delmonico, Francis L
Many nations are able to prosecute transplant-related crimes committed in their territory, but transplant recipients, organ sellers and brokers, and transplant professionals may escape prosecution by engaging in these practices in foreign locations where they judge the risk of criminal investigation and prosecution to be remote. The Declaration of Istanbul Custodian Group convened an international working group to evaluate the possible role of extraterritorial jurisdiction in strengthening the enforcement of existing laws governing transplant-related crimes across national boundaries. Potential practical and ethical concerns about the use of extraterritorial jurisdiction were examined, and possible responses were explored. Extraterritorial jurisdiction is a legitimate tool to combat transplant-related crimes. Further, development of a global registry of transnational transplant activities in conjunction with a standardized international referral system for legitimate travel for transplantation is proposed as a mechanism to support enforcement of national and international legal tools. States are encouraged to include provisions on extraterritorial jurisdiction in their laws on transplant-related crimes and to collaborate with professionals and international authorities in the development of a global registry of transnational transplant activities. These actions would assist in the identification and evaluation of illicit activities and provide information that would help in developing strategies to deter and prevent them.
Douhou, S.; Magnus, J.R.; van Soest, A.H.O.
Violations of social norms can be costly to society and they are, in the case of large crimes, followed by prosecution. Minor misbehaviors — small crimes — do not usually result in legal proceedings. Although the economic consequences of a single small crime can be low, such crimes generate
.... The arrival of the information age has created a new menace cyber terrorism. This threat recognizes no boundaries, requires minimal resources to mount an attack, and leaves no human footprint at ground zero...
Muoneke, Luke C. Vol 4 (2013) - Articles The need for a new convention to deal with aviation related crimes. Abstract PDF. ISSN: 2276-7371. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use · Contact ...
Beukman, B. Vol 13, No 3 (2000) - Articles Attitudes towards women and crime. Abstract · Vol 13, No 3 (2000) - Articles Rating violence on the web. Abstract · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions ...
Uwasomba, C. Vol 19, No 1 (2011) - Articles A socio-psychological exploration of Dostoyevsky's crime and punishment. Abstract. ISSN: 1117-1421. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use ...
Okorie, MM. Vol 4, No 3 (2015) - Articles Sexual Violence Infrastructures (SVIs): Hotels and Cyberspace as Enablers of Sexual Crimes in Nigeria Abstract PDF. ISSN: 2227-5452. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners ...
Azikiwe, A. Vol 32, No 2 (2002) - Articles Henry Kissinger's War Crimes should not be forgotten. Abstract. ISSN: 1995-641X. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use · Contact AJOL · News.
crime: the implications on e-banking. Abstract. ISSN: 1597-4316. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use ...
Williams, K. Vol 42 (2012) - Articles "Dip me in Chocolate and Thow me to the Lesbians": Homophobic hate crimes, the state and civil society. Abstract PDF. ISSN: 1991-3877. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms ...
Naidoo, Y. Vol 8, No 1 (2011) - Articles Book Review: The Country we Want to Live in: Hate Crimes and Homophobia in the Lives of Black Lesbian South Africans Abstract PDF. ISSN: 1813-4424. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL ...
Ige, Adebayo A. Vol 6 (2004) - Articles Factors influencing involvement of youth in crime as perceived by undergraduate students by University of Ilorin Abstract. ISSN: 1119-7048. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners ...
Akinpelu, O Funmilola. Vol 6 (2004) - Articles Factors influencing involvement of youth in crime as perceived by undergraduate students by University of Ilorin Abstract. ISSN: 1119-7048. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's ...
Roberts, Julian V.
Most people assume that criminal offenders have only been convicted of a single crime. However, in reality almost half of offenders stand to be sentenced for more than one crime.The high proportion of multiple crime offenders poses a number of practical and theoretical challenges for the criminal......, and psychology offer their perspectives to the volume. A comprehensive examination of the dynamics involved with sentencing multiple offenders has the potential to be a powerful tool for legal scholars and professionals, particularly given the practical importance of the topic and the relative dearth of research...
Cheng, Wen; Chiou, Wen-Bin
People frequently encounter sexual stimuli during Internet use. Research has shown that stimuli inducing sexual motivation can lead to greater impulsivity in men, as manifested in greater temporal discounting (i.e., a tendency to prefer smaller, immediate gains to larger, future ones). Extant findings in crime research suggest that delinquents tend to focus on short-term gains while failing to adequately think through the longer-term consequences of delinquent behavior. We experimentally tested the possibility that exposure to sexual stimuli is associated with the tendency to engage in cyber delinquency among men, as a result of their overly discounting remote consequences. In Experiment 1, participants exposed to pictures of "sexy" women were more likely to discount the future and were more inclined to make cyber-delinquent choices (e.g., cyberbullying, cyber fraud, cyber theft, and illegal downloading), compared with male participants who rated the sex appeal of less sexy opposite-sex pictures. However, these relationships were not observed in female participants exposed to either highly or less sexy pictures of men. In Experiment 2, male participants exposed to sexual primes showed a greater willingness to purchase a wide range of counterfeit rather than authentic products online and experienced a higher likelihood of logging into the other person's Facebook webpage (i.e., invading online privacy). The discounting tendency mediated the link between exposure to sexual primes and the inclination to engage in cyber-delinquent behavior. These findings provide insight into a strategy for reducing men's involvement in cyber delinquency; that is, through less exposure to sexual stimuli and promotion of delayed gratification. The current results suggest that the high availability of sexual stimuli in cyberspace may be more closely associated with men's cyber-delinquent behavior than previously thought.
van Dijk, Jan
The author argues that statistics of police-recorded crimes have limited utility for cross-country analyses of crime, due to varying legal definitions, reporting patterns and recording practices. In his view stand alone national victimisation surveys, with their varying methodologies and
Korovin E. P.
Full Text Available The article raises a set of problems traditionally arising in the classification of acts aimed to involve minors in the commission of a crime. The analysis conducted enables the authors to offer their own solutions in the form of specific recommendations on the legal assessment of the crime under study
Bennell, C.; Snook, B.; MacDonald, S.; House, J. C.; Taylor, Paul J
Computerized crime linkage systems are meant to assist the police in determining whether crimes have been committed by the same offender. In this article, the authors assess these systems critically and identify four assumptions that affect the effectiveness of these systems. These assumptions are
Li, Yun; Zhang, Ji; Li, Tao; Liu, Honggao; Li, Jieqing; Wang, Yuanzhong
In this work, the data fusion strategy of Fourier transform mid infrared (FT-MIR) spectroscopy and inductively coupled plasma-atomic emission spectrometry (ICP-AES) was used in combination with Support Vector Machine (SVM) to determine the geographic origin of Boletus edulis collected from nine regions of Yunnan Province in China. Firstly, competitive adaptive reweighted sampling (CARS) was used for selecting an optimal combination of key wavenumbers of second derivative FT-MIR spectra, and thirteen elements were sorted with variable importance in projection (VIP) scores. Secondly, thirteen subsets of multi-elements with the best VIP score were generated and each subset was used to fuse with FT-MIR. Finally, the classification models were established by SVM, and the combination of parameter C and γ (gamma) of SVM models was calculated by the approaches of grid search (GS) and genetic algorithm (GA). The results showed that both GS-SVM and GA-SVM models achieved good performances based on the #9 subset and the prediction accuracy in calibration and validation sets of the two models were 81.40% and 90.91%, correspondingly. In conclusion, it indicated that the data fusion strategy of FT-MIR and ICP-AES coupled with the algorithm of SVM can be used as a reliable tool for accurate identification of B. edulis, and it can provide a useful way of thinking for the quality control of edible mushrooms.
Zhang, Jie; Wu, Xiaohong; Yu, Yanmei; Luo, Daisheng
In optical printed Chinese character recognition (OPCCR), many classifiers have been proposed for the recognition. Among the classifiers, support vector machine (SVM) might be the best classifier. However, SVM is a classifier for two classes. When it is used for multi-classes in OPCCR, its computation is time-consuming. Thus, we propose a neighbor classes based SVM (NC-SVM) to reduce the computation consumption of SVM. Experiments of NC-SVM classification for OPCCR have been done. The results of the experiments have shown that the NC-SVM we proposed can effectively reduce the computation time in OPCCR.
Full Text Available In optical printed Chinese character recognition (OPCCR, many classifiers have been proposed for the recognition. Among the classifiers, support vector machine (SVM might be the best classifier. However, SVM is a classifier for two classes. When it is used for multi-classes in OPCCR, its computation is time-consuming. Thus, we propose a neighbor classes based SVM (NC-SVM to reduce the computation consumption of SVM. Experiments of NC-SVM classification for OPCCR have been done. The results of the experiments have shown that the NC-SVM we proposed can effectively reduce the computation time in OPCCR.
to-Workstation Communication • Antivirus File Reputation Services • Anti-Exploitation • Host Intrusion Prevention Systems • Secure Baseline...all U.S. Naval Academy midshipmen fourth class (freshmen), we outline three commonly-used principles of cyber defense: the Principle of Least...missions in Iraq. At the Naval Academy, he served as course coordinator from 2013-2014 for the school’s Introduction to Cyber Security class , taken by
Philipson, Tomas J; Posner, Richard A
Economic analysis of infectious diseases emphasizes the self-correcting character of epidemics, as rising risk of infection causes potential victims to take self-protective measures. We apply the analysis to crime, showing how rational potential victims of crime will take increased self-protective measures in response to rising crime rates, causing those rates to moderate. Victim responses to crime can offset public expenditures on crime control; this implies that there may be a "natural" rat...
Entner Wright, Bradley R.; Younts, C. Wesley
Studies of race and crime have emphasized the effects of social disadvantage and discrimination on increasing crime among African Americans. The authors extend this literature by examining various beliefs and institutions that have developed within African American communities that, in contrast, decrease criminal behavior. A model of…
Brown, Karen; Jackson, Margaret; Cassidy, Wanda
The article reviews existing research on cyber-bullying, framed through a policy lens. It is clear that public policy issues for cyber-bullying involve tensions between the values of freedom of speech, the best interests of the child, and parental and school protective authority over the child. Given the complexity of the problem, as well as…
Poelman, Wim; Junger, Marianne
Aan de Universiteit Twente is in 2009 de onderzoekgroep Crime Science Twente (CST) opgericht, waarin diverse faculteiten samenwerken. Inmiddels zijn verschillende onderzoekprojecten tot stand gebracht en is er een minor ontwikkeld waaraan studenten hebben deelgenomen. Vanuit de faculteit
Lykken, David T.
Discusses psychopathology as portrayed in literature, followed by an examination of some theories of psychopathy and the association of sociopathy and crime. Also discusses using parental licensing as a preventive measure against the development of sociopathology in children. (GR)
Pechorro, Pedro; Gonçalves, Rui Abrunhosa; Marôco, João; Nunes, Cristina; Jesus, Saul Neves
The aim of this study was to analyze the role of psychopathic traits in the age of crime onset of female juvenile delinquents. Using a sample of 132 young females from the Juvenile Detention Centers of the Portuguese Ministry of Justice and from schools in the Lisbon region, a group of early crime onset (n = 44), a group of late crime onset (n = 44), and a nondelinquent school group (n = 44) were formed. Results showed that early crime onset participants score higher on psychopathy measures, self-reported delinquency, and crime seriousness than late crime onset participants and school participants. Psychopathic-traits scores were significantly associated with age of crime onset, age at first trouble with the law, and frequency and seriousness of crime. © The Author(s) 2013.
... 25 Indians 1 2010-04-01 2010-04-01 false Can I be paid for information that helps solve a crime... COUNTRY LAW ENFORCEMENT Support Functions § 12.61 Can I be paid for information that helps solve a crime... investigation of a crime. This is subject to the availability of funds. This authority may be delegated in...
Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.
Bogar, Sandra; Beyer, Kirsten M
To determine the state of evidence on relationships among urban green space, violence, and crime in the United States. Major bibliographic databases were searched for studies meeting inclusion criteria. Additional studies were culled from study references and authors' personal collections. Comparison among studies was limited by variations in study design and measurement and results were mixed. However, more evidence supports the positive impact of green space on violence and crime, indicating great potential for green space to shape health-promoting environments. Numerous factors influence the relationships among green space, crime, and violence. Additional research and standardization among research studies are needed to better understand these relationships. © The Author(s) 2015.
Heussen, Kai; Tyge, Emil; Kosek, Anna Magdalena
A real-time demand response system can be viewed as a cyber-physical system, with physical systems dependent on cyber infrastructure for coordination and control, which may be vulnerable to cyber-attacks. The time domain dynamic behaviour of individual residential demand responses is governed...... by a mix of physical system parameters, exogenous influences, user behaviour and preferences, which can be characterized by unstructured models such as a time-varying finite impulse response. In this study, which is based on field data, it is shown how this characteristic response behaviours can...... be identified and how the characterization can be updated continuously. Finally, we propose an approach to apply this behaviour characterization to the identification of anomalous and potentially malicious behaviour modifications as part of a cyber-physical intrusion detection mechanism....
threats of climate change , malicious cyber activity, pandemic diseases, and transnational terrorism and crime. The U.S. must remain aware of the changing ...despite the 34 efforts of the U.S. or Colombian government. Thus, the strategy in Colombia has changed from merely field eradication to counter...narcotics networks. This change in mission extends the influence of the military presence in Colombia . “Since the guerrillas are associated with the coca
Jiao, You-Quan; Feng, Zhong-Ke; Zhao, Li-Xi; Xu, Wei-Heng; Cao, Zhong
In order to establish volume model,living trees have to be fallen and be divided into many sections, which is a kind of destructive experiment. So hundreds of thousands of trees have been fallen down each year in China. To solve this problem, a new method called living tree volume accurate measurement without falling tree was proposed in the present paper. In the method, new measuring methods and calculation ways are used by using photoelectric theodolite and auxiliary artificial measurement. The diameter at breast height and diameter at ground was measured manually, and diameters at other heights were obtained by photoelectric theodolite. Tree volume and height of each tree was calculated by a special software that was programmed by the authors. Zhonglin aspens No. 107 were selected as experiment object, and 400 data records were obtained. Based on these data, a nonlinear intelligent living tree volume prediction model with Particle Swarm Optimization algorithm based on support vector machines (PSO-SVM) was established. Three hundred data records including tree height and diameter at breast height were randomly selected form a total of 400 data records as input data, tree volume as output data, using PSO-SVM tool box of Matlab7.11, thus a tree volume model was obtained. One hundred data records were used to test the volume model. The results show that the complex correlation coefficient (R2) between predicted and measured values is 0. 91, which is 2% higher than the value calculated by classic Spurr binary volume model, and the mean absolute error rates were reduced by 0.44%. Compared with Spurr binary volume model, PSO-SVM model has self-learning and self-adaption ability,moreover, with the characteristics of high prediction accuracy, fast learning speed,and a small sample size requirement, PSO-SVM model with well prospect is worth popularization and application.
Full Text Available wall around pertinent technologies in an effort to protect them. However, perpetrators still manage to find a way to infiltrate networks and systems. This is where cyber intelligence can play a fundamental role. Cyber intelligence provides...
Choi, Yoo Rark; Lee, Jae Cheol; Choi, Young Soo; Hong, Seok Boong
Cyber security includes the method of protecting information, computer programs, and other computer system assets. Hardware security, which is the security of computer assets and capital equipment, refers to computer location, access control, fire protection, and storage procedures. Such measures as badges, electronic identification keys, alarm systems, and physical barriers at entries are used for this purpose. Software security entails the protection of software assets such as Application Programs, the Operating System, and the Data Base Management System and stored information. Special user numbers and passwords are typically used to prevent unauthorized access to software and data. In addition to security for hardware and software, good internal control also requires that measures be taken to prevent loss or accidental destruction of data. Cyber attacks create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for the digital I and C network of the NPP has been established for years by KINS, but its scope is very broad and conceptual. We will propose a cyber security method based on cryptography and authentication that is developed for the digital I and C network of the NPP
Mohammad Murtaza Sherzoy
Full Text Available Support Vector Machine (SVM and Adaptive Neuro-Fuzzy inference Systems (ANFIS both analytical methods are used to predict the values of Atterberg limits, such as the liquid limit, plastic limit and plasticity index. The main objective of this study is to make a comparison between both forecasts (SVM & ANFIS methods. All data of 54 soil samples are used and taken from the area of Peninsular Malaysian and tested for different parameters containing liquid limit, plastic limit, plasticity index and grain size distribution and were. The input parameter used in for this case are the fraction of grain size distribution which are the percentage of silt, clay and sand. The actual and predicted values of Atterberg limit which obtained from the SVM and ANFIS models are compared by using the correlation coefficient R2 and root mean squared error (RMSE value. The outcome of the study show that the ANFIS model shows higher accuracy than SVM model for the liquid limit (R2 = 0.987, plastic limit (R2 = 0.949 and plastic index (R2 = 0966. RMSE value that obtained for both methods have shown that the ANFIS model has represent the best performance than SVM model to predict the Atterberg Limits as a whole.
government property.”12 Applying these standards to cyberspace is contentious in the international community since millions of cyber attacks transpire daily...forces and creating additional hostility. At its very nature cyber warfare can be both coercive and destructive. “At the strategic level, cyber attacks could...in the state is an armed attack.”42 Other interpretations require a higher threshold for invoking Article 51. “[O]nly large scale cyber attacks on
recovering from cyber attacks . Discussion: United States is again awaiting a very public, catastrophic event before awakening to the threat of cyber...computing, the DOD should lead efforts to prevent, detect, and recover from cyber attacks against government and critical infrastructure. By leveraging...Department of Defense (DOD) as the lead organization in preventing, detecting, and recovering from cyber attacks . In 2009, the Wall Street Journal
Digital culture is part of children’s and adolescents’ everyday lives. Digital culture has both positive and negative consequences. One such negative consequence is cyber violence that has been termed cyber bullying. Cyber bullying can cause serious emotional, behavioural and academic problems for both the victim and the bully. Although there is ongoing research on the effects of cyber bullying on children and youth in South Africa, no research has been carried out on how children’s and youth...
Biener, Christian; Eling, Martin; Wirfs, Jan Hendrik
This paper discusses the adequacy of insurance for managing cyber risk. To this end, we extract 994 cases of cyber losses from an operational risk database and analyse their statistical properties. Based on the empirical results and recent literature, we investigate the insurability of cyber risk by systematically reviewing the set of criteria introduced by Berliner (1982). Our findings emphasise the distinct characteristics of cyber risks compared with other operational risks and bring to li...
reverse engineering, security, malware , blackhat) were labeled as cyber and posts on non- cyber topics (e.g., astronomy, electronics, beer, biology, mu...firewall, hash, infect, inject, install, key, malicious, malware , network, obfuscate, overflow, packet, password, payload, request, risk, scan, script...randomly sampled user discussing cyber topics, no extra labeling or cost is in- curred by incorporating additional training data. The same 127 cyber
Blakely, Benjamin A.
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Full Text Available innocent internet users from becoming victims of cyber attacks, a cyber security awareness campaign is developed to educate novice internet and technology users with regard to basic cyber security. The motivation for this awareness project is to educate all...
Full Text Available would be needed by a Cyber Security Operations Centre in order to perform offensive cyber operations?". The analysis was performed, using as a springboard seven models of cyber-attack, and resulted in the development of what is described as a canonical...
M. J. Baheti
Full Text Available With the advent of technological era, conversion of scanned document (handwritten or printed into machine editable format has attracted many researchers. This paper deals with the problem of recognition of Gujarati handwritten numerals. Gujarati numeral recognition requires performing some specific steps as a part of preprocessing. For preprocessing digitization, segmentation, normalization and thinning are done with considering that the image have almost no noise. Further affine invariant moments based model is used for feature extraction and finally Support Vector Machine (SVM and Fuzzy classifiers are used for numeral classification. . The comparison of SVM and Fuzzy classifier is made and it can be seen that SVM procured better results as compared to Fuzzy Classifier.
Gan, X.; Kapsokalivas, L.; Skaliotis, A.; Steinhöfel, K.; Tangaro, S.
Mammography is among the most popular imaging techniques used in the diagnosis of breast cancer. Nevertheless distinguishing between healthy and ill images is hard even for an experienced radiologist, because a single image usually includes several regions of interest (ROIs). The hardness of this classification problem along with the substantial amount of data, gathered from patients' medical history, motivates the use of a machine learning approach as part of a CAD (Computer Aided Detection) tool, aiming to assist radiologists in the characterization of mammography images. Specifically, our approach involves: i) the ROI extraction, ii) the Feature Vector extraction, iii) the Support Vector Machine (SVM) classification of ROIs and iv) the characterization of the whole image. We evaluate the performance of our approach in terms of the SVM's training and testing error and in terms of ROI specificity—sensitivity. The results show a relation between the number of features used and the SVM's performance.
Gan, X.; Kapsokalivas, L.; Skaliotis, A.; Steinhoefel, K.; Tangaro, S.
Mammography is among the most popular imaging techniques used in the diagnosis of breast cancer. Nevertheless distinguishing between healthy and ill images is hard even for an experienced radiologist, because a single image usually includes several regions of interest (ROIs). The hardness of this classification problem along with the substantial amount of data, gathered from patients' medical history, motivates the use of a machine learning approach as part of a CAD (Computer Aided Detection) tool, aiming to assist radiologists in the characterization of mammography images. Specifically, our approach involves: i) the ROI extraction, ii) the Feature Vector extraction, iii) the Support Vector Machine (SVM) classification of ROIs and iv) the characterization of the whole image. We evaluate the performance of our approach in terms of the SVM's training and testing error and in terms of ROI specificity - sensitivity. The results show a relation between the number of features used and the SVM's performance
... landfill has additional capacity for future waste deposition; HMIWIs that combust any amount of hospital... Jersey Air Emissions from Existing Municipal Solid Waste Landfills, Small Municipal Waste Combustion Units, and Hospital/medical/infectious Waste Incinerators. § 62.7605 Identification of plan—delegation...
as the approach of genre typology and the concept of evil – seemingly disparate concepts and approaches, but all related to the complex processes in the borderlands between crime fiction and society. Using examples from Scandinavian crime fiction, I discuss whether the growing proximity to international genres......The working paper discusses some of the major approaches to Scandinavian crime fiction in the light of the dominant features of crime culture, e.g. the broad exposure of crime fiction via different platforms and media. In this connection, the concept of mediatization is considered as well......, ways of production and standards increasingly removes Scandinavian crime fiction from its original attractions or not....
Full Text Available This paper discusses a least square support vector machine (LS-SVM approach for forecasting stability parameters of Francis turbine unit. To achieve training and testing data for the models, four field tests were presented, especially for the vibration in Y-direction of lower generator bearing (LGB and pressure in draft tube (DT. A heuristic method such as a neural network using Backpropagation (NNBP is introduced as a comparison model to examine the feasibility of forecasting performance. In the experimental results, LS-SVM showed superior forecasting accuracies and performances to the NNBP, which is of significant importance to better monitor the unit safety and potential faults diagnosis.
Kang, Y.; Jeong, C. H.; Kim, D. I.
In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the systems can seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security activities throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the regulatory on cyber security activities to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory guide includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems. (authors)
Full Text Available The head of the CSIR safety and security competency area, Dr Barend Taute, says that about 10 years ago the CSIR considered what could be done about crime in South Africa. They established a crime prevention centre which eventually became the Safety...
SABAU-POPA CLAUDIA DIANA
Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the
Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove
Oleszkiewicz, Witold; Cichosz, Paweł; Jagodziński, Dariusz; Matysiewicz, Mateusz; Neumann, Łukasz; Nowak, Robert M.; Okuniewski, Rafał
This article presents the application of machine learning algorithms for early detection of breast cancer on the basis of thermographic images. Supervised learning model: Support vector machine (SVM) and Sequential Minimal Optimization algorithm (SMO) for the training of SVM classifier were implemented. The SVM classifier was included in a client-server application which enables to create a training set of examinations and to apply classifiers (including SVM) for the diagnosis and early detection of the breast cancer. The sensitivity and specificity of SVM classifier were calculated based on the thermographic images from studies. Furthermore, the heuristic method for SVM's parameters tuning was proposed.
Nancy J. Cooke
Full Text Available Cyber analysis is a complex task that requires the coordination of a large sociotechnical system of human analysts working together with technology. Adequate situation awareness of such a complex system requires more than aggregate situation awareness of individuals. Teamwork in the form of communication and information coordination is at the heart of team-level situation awareness. In this position paper, we report observations from previously conducted cognitive task analyses that suggest that teamwork is lacking in many cyber analysis organizations. Communication is ineffective, team roles are inconsistent across organizations, reward structures and selection may thwart collaboration, and the environment is conducive to individual work. Suggestions for improving teamwork in the cyber domain are offered.
Van Heerden, CJ
Full Text Available , the amount of learning data. By using these arguments, the authors present a simple algorithm for finding approximate hyperparameters on a reduced dataset, followed by a focused line search on the full dataset. Using this algorithm gives comparable results...
Heitner, Kerri A.
Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.
Machmuddin, D. D.; Pratama, B.
Cyber regulation is very important to control human interaction within the Internet network in cyber space. On the surface, innovation development in science and technology facilitates human activity. But on the inside, innovation was controlled by new business model. In cyber business activities mingle with individual protection. By this condition, the law should keep the balance of the activities. Cyber law problems, were not particular country concern, but its global concern. This is a good opportunity for developing country to catch up with developed country. Beside this opportunity for talented people in law and technology is become necessity. This paper tries to describe cyber law in Indonesia. As a product of a developing country there are some of weakness that can be explained. Terminology and territory of cyber space is become interesting to discuss, because this two problems can give a broad view on cyber law in Indonesia.
Matcheswalla, Yusuf; De Sousa, Avinash
Psychiatry and crime are linked in certain ways. On one hand, we have criminal offenders with serious psychopathology; and on the other hand, we have psychiatric patients who may commit criminal offences during the influence of a psychiatric disorder. The psychiatrist in practice has to come in contact with the criminal justice system at some point of time in his career. Forensic psychiatry under whose realm these issues reside is a branch yet underdeveloped in India. The present paper reviews the inter-relationship between crime and psychiatry and the factors involved therein. PMID:25838733
Anderson, Robert S.
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the
the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security......The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...
Robert S. Anderson
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the
The various types of arrhythmias in the cardiac arrhythmias ECG database chosen from University of California at Irvine (UCI) to train SVM include ischemic changes (coronary artery disease), old inferior myocardial infarction, sinus bradycardy, right bundle branch block, and others. ECG arrhythmia datasets are of generally ...
Full Text Available Accurate forecast of the sales growth rate plays a decisive role in determining the amount of advertising investment. In this study, we present a preclassification and later regression based method optimized by improved particle swarm optimization (IPSO for sales growth rate forecasting. We use support vector machine (SVM as a classification model. The nonlinear relationship in sales growth rate forecasting is efficiently represented by SVM, while IPSO is optimizing the training parameters of SVM. IPSO addresses issues of traditional PSO, such as relapsing into local optimum, slow convergence speed, and low convergence precision in the later evolution. We performed two experiments; firstly, three classic benchmark functions are used to verify the validity of the IPSO algorithm against PSO. Having shown IPSO outperform PSO in convergence speed, precision, and escaping local optima, in our second experiment, we apply IPSO to the proposed model. The sales growth rate forecasting cases are used to testify the forecasting performance of proposed model. According to the requirements and industry knowledge, the sample data was first classified to obtain types of the test samples. Next, the values of the test samples were forecast using the SVM regression algorithm. The experimental results demonstrate that the proposed model has good forecasting performance.
Full Text Available Accurate traffic flow prediction is prerequisite and important for realizing intelligent traffic control and guidance, and it is also the objective requirement for intelligent traffic management. Due to the strong nonlinear, stochastic, time-varying characteristics of urban transport system, artificial intelligence methods such as support vector machine (SVM are now receiving more and more attentions in this research field. Compared with the traditional single-step prediction method, the multisteps prediction has the ability that can predict the traffic state trends over a certain period in the future. From the perspective of dynamic decision, it is far important than the current traffic condition obtained. Thus, in this paper, an accurate multi-steps traffic flow prediction model based on SVM was proposed. In which, the input vectors were comprised of actual traffic volume and four different types of input vectors were compared to verify their prediction performance with each other. Finally, the model was verified with actual data in the empirical analysis phase and the test results showed that the proposed SVM model had a good ability for traffic flow prediction and the SVM-HPT model outperformed the other three models for prediction.
The efficacy of support vector machines (SVM) in robust determination of earthquake early warning magnitudes in central Japan. Ramakrushna Reddy and Rajesh R Nair ..... SVMs were developed to solve the classification problem. However, recently, SVMs have been suc- cessfully extended to regression and density esti-.
The efficacy of support vector machines (SVM) in robust determination of earthquake early ... This work deals with a methodology applied to seismic early warning systems which are designed to provide real-time estimation of the ... The effectiveness of warning systems can be pre- dicted by using P-wave rather than S-wave ...
Design and Status of Solar Vector Magnetograph (SVM-I) at Udaipur Solar Observatory. Sanjay Gosain. 1,2,∗. , P. Venkatakrishnan. 1. & K. Venugopalan. 2. 1Udaipur Solar Observatory, P. O. Box 198, Dewali, Bari Road, Udaipur 313 001, India. ... formance of the system on a tracking mount and its control software is.
Full Text Available The subject of cyber-security and therefore cyber-attacks on smart grid (SG has become subject of many publications in the last years, emphasizing its importance in research, as well as in practice. One especially vulnerable part of SG are smart meters (SMs. The major contribution of simulating a variety of cyber-attacks on SMs that have not been done in previous studies is the identification and quantification of the possible impacts on the security of SG. In this study, a simulation model of a nanogrid, including a complete household with an SM, was developed. Different cyber-attacks were injected into the SM to simulate their effects on household nanogrid. The analysis of the impacts of different cyber-attacks showed that the effects of cyber-attacks can be sorted into various categories. Integrity and confidentiality attacks cause monetary effects on the grid. While, availability attacks have monetary effects on the grid as well, they are mainly aimed at compromising the SM communication by either delaying or stopping it completely.
Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng
Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.
Graber, Doris A.
Reports on the frequency and manner in which various crime and noncrime news topics were presented in selected newspapers and television newscasts in 1976. Examines news flow data to determine whether news output was inflexible, and whether crime news coverage distorted the amount of real-life crime. (PD)
Draper, Rick; Cadzow, Emma
Applying CPTED (Crime Prevention Through Environmental Design) strategies to schools can significantly contribute to a safer learning environment by influencing the behaviour of students and visitors. CPTED has three overlapping primary concepts that are intended to reduce opportunities for crime as well as fear of crime: access control,…
Full Text Available Crime maps show crime density values and locations where crime have accured. For this reason it had been easy to examine the spatial distribution of crime locations with crime maps. There for crime maps have long been part of the process to crime analysis. In this study, the crime of home burglary was mapped with respect to general areal distribution by GIS (Geographic Information System in the city of Elazig The distribution of the crime was handled considering the parameters such as month, day and hour, and related to the land use. As a result, it was determined that there were differences in the distribution and concentration in the crime of theft with respect to the land use inside the city. The methods and findings in this study will provide rapid and accurate analyses for such kinds of studies. In addition, Interrelating the type of the crime with the regions or areas will contribute to preventing crime, and security in urban areas.
This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, rotect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication...
Full Text Available The development of the information and communication technology (ICT, regardless of its many advantages, unfortunately has its disadvantage - the abuse of the cyberworld. The global character of cyberspace is specific in terms of national legislation and its view of specificities. Some countries adopted the recommendation of the Convention on Cybercrime of the Council of Europe (Official Gazette NN-MU 9/02, 4/04 and amended their national legislation, whereas others kept implementing their criminal law solutions, which are outdated and cannot reach the level of this type of criminal offences. Consequently, governments are inclined to cooperate and exchange information about this type of crime due to the fact that the criminal offender may be anywhere, and the offence itself can take place at a great distance from the offender. In September 2015, the government of the Republic of Croatia adopted the National Cyber Security Strategy and the Action Plan for the Implementation of the National Cyber Security Strategy, the first allencompassing strategy of the Republic of Croatia on cyber security. The paper also focuses on the role of the Police College in the Action Plan for the Implementation of the National Cyber Security Strategy.
-I (SVM-I) currently being developed at Udaipur Solar Observatory. SVM-I is an instrument which aims to determine the magnetic field vector in the solar atmosphere by measuring Zeeman induced polarization across the ...
Daley, M.; Doucet, R.; Echlin, M.; MacDonald, M.; Mihaylov, V.; Sijs, J.; Trask, D. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada)
Since 2008, the Canadian Nuclear Safety Commission (CNSC), similar to regulators of other critical industries, has requested their licensees to implement cyber security programs and conduct self- assessments without the benefit of an industry specific cyber security standard that provides common metrics for coverage and effectiveness of their programs. However, for the nuclear industry, a new CSA standard 290.7 entitled 'Cyber security for nuclear power plants and small reactor facilities', released in December 2014, will have the CNSC looking to facility operators to be compliant to the new standard. This paper will discuss initiatives at Canadian Nuclear Laboratories to develop of a suite of tools, techniques, and best practices that can be used by the regulator and industry for assessing compliance and effectiveness of cyber security technology and implementations. (author)
Akutaev, Rasul M.; Magomedov, Guseyn B.
The relevance of the research of this problem is caused by the theoretical and practical needs of a specific concept of the crime object as one of the corpus delicti signs essentially the determining and defining its object and objective side, thereby--the nature of socially dangerous act. Besides, being a facultative sign of corpus delicti, the…
Wikström, Per-Olof H.; Treiber, Kyle
In this article, we analyze the relationship between social disadvantage and crime, starting from the paradox that most persistent offenders come from disadvantaged backgrounds, but most people from disadvantaged backgrounds do not become persistent offenders. We argue that despite the fact that social disadvantage has been a key criminological topic for some time, the mechanisms which link it to offending remain poorly specified. Drawing on situational action theory, we suggest social disadvantage is linked to crime because more people from disadvantaged versus affluent backgrounds develop a high crime propensity and are exposed to criminogenic contexts, and the reason for this is that processes of social and self-selection place the former more frequently in (developmental and action) contexts conducive to the development and expression of high crime propensities. This article will explore this hypothesis through a series of analyses using data from the Peterborough Adolescent and Young Adult Development Study (PADS+), a longitudinal study which uses a range of data collection methods to study the interaction between personal characteristics and social environments. It pays particular attention to the macro-to-micro processes behind the intersection of people with certain characteristics and environments with certain features – i.e., their exposure – which leads to their interaction. PMID:27524829
Hein, Annamae J.
Describes the Crime Lab Project, which takes an economical, hands-on, interdisciplinary approach to studying the career of forensics in the middle or high school classroom. Includes step-by-step student requirements for the investigative procedure, a sample evidence request form, and an assessment rubric. (KHR)
parties, 'the media', and parts of 'civil society') that speak of xenophobic sentiments and tensions therefore become 'peddlers of… rumours and lies who are hell-bent to dent our humanity as a people.'32 The crime discourse, by contrast, does not hold the same ideological and political tinder since 'criminals' are constructed ...
Nyagudi, Nyagudi Musandu
WHITE COLLAR CRIME - Investigations Presentation By Dr. Nyagudi MusanduForensic Criminologist 2nd International Securityand Safety Conference and Exhibition, 16th April, 2010 a forum hosted by Events Management Solutions at the Sarit Centre, Nairobi, Kenya
Abel, Charles F.
Articulates need, nature, and form of a restitutionary approach to corporate crime. Considers small, in-prison production-oriented programs; residential in-community programs, and nonresidential in-community programs for individual offenders; also considers lump sum and continuous payments for corporations to make restitution. (NRB)
Witham, Shelly Anne; Krockover, Gerald H.; Burgess, Wilella; Bayley, Bill
Forensics can serve as the perfect vehicle for science exploration and learning. As part of a professional development workshop, teachers participated in various forensic activities. This article describes an archaeological dig simulation that provides the catalyst for an inquiry-based activity. In this activity, teachers make crime scene…
Beginning with the last review of gender and crime that appeared in the Annual Review of Sociology (1996), I examine the developments in the more traditional approaches to this subject (the gender ratio problem and the problem of theoretical generalization), life course research, and feminist
Full Text Available An effective method for the damage detection of skeletal structures which combines the cross correlation function amplitude (CCFA with the support vector machine (SVM is presented in this paper. The proposed method consists of two stages. Firstly, the data features are extracted from the CCFA, which, calculated from dynamic responses and as a representation of the modal shapes of the structure, changes when damage occurs on the structure. The data features are then input into the SVM with the one-against-one (OAO algorithm to classify the damage status of the structure. The simulation data of IASC-ASCE benchmark model and a vibration experiment of truss structure are adopted to verify the feasibility of proposed method. The results show that the proposed method is suitable for the damage identification of skeletal structures with the limited sensors subjected to ambient excitation. As the CCFA based data features are sensitive to damage, the proposed method demonstrates its reliability in the diagnosis of structures with damage, especially for those with minor damage. In addition, the proposed method shows better noise robustness and is more suitable for noisy environments.
Chen, Suhang; Chang, Sheng; Huang, Qijun; He, Jin; Wang, Hao; Huang, Qiangui
Synthetic fingerprints are a potential threat to automatic fingerprint identification systems (AFISs). In this paper, we propose an algorithm to discriminate synthetic fingerprints from real ones. First, four typical characteristic factors-the ridge distance features, global gray features, frequency feature and Harris Corner feature-are extracted. Then, a support vector machine (SVM) is used to distinguish synthetic fingerprints from real fingerprints. The experiments demonstrate that this method can achieve a recognition accuracy rate of over 98% for two discrete synthetic fingerprint databases as well as a mixed database. Furthermore, a performance factor that can evaluate the SVM's accuracy and efficiency is presented, and a quantitative optimization strategy is established for the first time. After the optimization of our synthetic fingerprint discrimination task, the polynomial kernel with a training sample proportion of 5% is the optimized value when the minimum accuracy requirement is 95%. The radial basis function (RBF) kernel with a training sample proportion of 15% is a more suitable choice when the minimum accuracy requirement is 98%.
Full Text Available Computers have been used for mechanization and automation in different applications of agriculture/horticulture. The critical decision on the agricultural yield and plant protection is done with the development of expert system (decision support system using computer vision techniques. One of the areas considered in the present work is the processing of images of plant diseases affecting agriculture/horticulture crops. The first symptoms of plant disease have to be correctly detected, identified, and quantified in the initial stages. The color and texture features have been used in order to work with the sample images of plant diseases. Algorithms for extraction of color and texture features have been developed, which are in turn used to train support vector machine (SVM and artificial neural network (ANN classifiers. The study has presented a reduced feature set based approach for recognition and classification of images of plant diseases. The results reveal that SVM classifier is more suitable for identification and classification of plant diseases affecting agriculture/horticulture crops.
Kristensen, Mads Darø
Cyber foraging helps small devices perform heavy tasks by opportunistically discovering and utilising available resources (such as computation, storage, bandwidth, etc.) held by larger, nearby peers. This offloading is done in an ad-hoc manner, as larger machines will not always be within reach...
Joo, Young Ju; Lim, Kyu Yon; Cho, Sun Yoo; Jung, Bo Kyung; Choi, Se Bin
The study aims to investigate structural relationships among teenagers' peer attachment, self-control, academic stress, internet usage time, and cyber delinquency. The data source was the Korea Youth Panel Survey, and the responses from 920 teenagers in the 12th grade provided the study data. Structural equation modeling was used for the analysis.…
Functional Mission Analysis (FMA) is a disciplined way to tease out these linkages and integrate that metadata into our reporting systems and...UNCLASSIFIED - Distribution A: Approved for public release; distribution unlimited AIR FORCE CYBERWORX REPORT 16-003: A RESPONSIVE CYBER RISK...facilitated design thinking sessions that bring stakeholders , industry and academic experts together to develop solutions to hard problems. These
Hansen, Kasper Møller; Kosiara-Pedersen, Karina
sites and Facebook sites are popular among candidates but other features such as blogs, feeds, newsletter, video uploads, SMS and twitter are used by less than half the candidates. Second, only age and possibly education seem to matter when explaining the uptake of cyber-campaigning. The prominent...
Full Text Available The manner in which hostilities are being conducted has changed in recent years. The battle field has transpired beyond the physical realm and now has a virtual component. Because of this, it is now easier than ever for civilians to get involved in hostilities. International Humanitarian Law applies to all situations of armed conflict and according to the principle of distinction, the parties to the conflict must, at all times, distinguish between civilians and combatants. The problem arises when the line between combatants and civilians starts to get blurry. Direct civilian participation in hostilities has been addressed in both Additional Protocols to the Geneva Conventions of 1949 and in 2009 the International Committee of the Red Cross published the Interpretive guidance on the notion of Direct Participation in Hostilities under international humanitarian law. Another document that addresses the problem of civilian direct participation is the Tallinn Manual on the International Law Applicable to Cyber Warfare prepared by an international group of experts at the invitation of the NATO Cooperative Cyber Defence Centre of Excellence in 2013. The guide prepared by the ICRC addresses the problem of civilian direct participation during conventional situations of armed conflict, while the Tallinn Manual addresses direct participation in situations of cyber warfare. The purpose of this paper is to study the application of civilian direct participation to situations of cyber warfare.
Center for Homeland Defense and Security Naval Postgraduate School
Part 1: The notion that the United States is vulnerable to a strategic surprise attack bent on incapacitating computational and communication capabilities, which is often characterized by senior officials, military commanders, scholars and the popular media as a “Cyber Pearl Harbor,” is a mainstay of current strategic discourse.
on the ground with them or while continents away.”86 Cultural sensitivity is clearly critical for the success of these operations. Ultimately, cyber...Andrew Campbell, and Ian Hughes, “Research: Ageing, social capital and the Internet: Findings from an exploratory study of Australian ‘silver surfers
strategy implementation that focuses interagency action without just incurring a tax on agencies for another liaison. Private Sector Integration...against nations that we are intrinsically linked through other aspects of US foreign policy. Secrecy and cyber-enabled anonymity does not alleviate
Rogers, Gary; Ashford, Tina
In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…
Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)
This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.
Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de
Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of
Full Text Available УДК 343(2+7The main provisions of the theory of qualification of crimes were developed in the Soviet times. Some of them, notably relating to the content of criminal law assessment, have become obsolete. Therefore, the article aims to interpret a new vision of the content of qualification. The methods used in the research include analysis, synthesis, induction, deduction, interview and statistical method. The authors note that in practice, in fact, general and specific signs of the crimes appearing in the criminal law are used in the qualification of crime.The authors question the use of "corpus delicti" in enforcement during the criminal legal evaluation. Corpus delicti was created in science to the full understanding and disclosure of the crime and its possible structures. It is impossible to carry out qualification and to resolve issues of criminal responsibility or exemption from it on the basis of scientific statements, which are not enshrined in law.Without knowledge of corpus delicti it is possible to hold a formal qualification of the offences and the imposition of criminal liability. This is due to the fact that all penal signs, sufficient for criminal liability provided for in the existing criminal law of the Russian Federation.The authors make the conclusion that qualification is carried out not in terms of corpus delicti, which is a scientific category, but on the basis of general features of crime – guilt, social danger, unlawfulness, liability to punishment, since it is them that are consolidated on the legislative level.
Akazhanov, Nurbek A.; Voronov, Alexander A.; Kitas, George D.
Unique identifiers of researchers and authors can help all stakeholders of scientific communications improve their workflows. There have been several attempts to establish professional networks of scholars and list their scholarly achievements on digital platforms. Some of these platforms such as Google Scholar, Web of Knowledge and PubMed are searched to pick relevant peer reviewers, assess authors' publication history or choose suitable candidates for research and academic projects. However, each of these hubs has its specific applications, limiting the universal use for permanent tagging of researcher profiles. The Open Researcher and Contributor ID (ORCID) initiative, launched in 2012, is aimed at registering scholarly contributors and averting the persistent ambiguity of recorded author names. The ORCID registry is growing fast and integrating with other ID-generating platforms, thereby increasing the functionality of the integrated systems. ORCID identifiers are increasingly used for selecting peer reviewers and acknowledging various scholarly contributions (e.g., published articles, reviewer comments, conference presentations). The initiative offers unique opportunities for transparent disclosures of author contributions and competing interests and improving ethical standards of research, editing, and publishing. PMID:25408574
Full Text Available Digital culture is part of children’s and adolescents’ everyday lives. Digital culture has both positive and negative consequences. One such negative consequence is cyber violence that has been termed cyber bullying. Cyber bullying can cause serious emotional, behavioural and academic problems for both the victim and the bully. Although there is ongoing research on the effects of cyber bullying on children and youth in South Africa, no research has been carried out on how children’s and youth’s spirituality may be affected when they are cyber bullied. This article discusses the accumulative results from different South African institutes that have researched the cyber bullying effects on children and adolescents. These results point to the spiritual effects that children and youth may experience as a result of cyber bullying. This article proposes that spirituality may prevent cyber bullying and even help children and youth heal from the trauma caused by cyber bullying. This article contributes in starting a conversation that may result in more specific research being done on how the spiritual lives of children and adolescents may be affected through the trauma caused by cyber bullying.
Serfaty, Marc; Ridgewell, Anna; Drennan, Vari; Kessel, Anthony; Brewin, Chris R; Leavey, Gerard; Wright, Anwen; Laycock, Gloria; Blanchard, Martin
Limited data suggest that crime may have a devastating impact on older people. Although identification and treatment may be beneficial, no well-designed studies have investigated the prevalence of mental disorder and the potential benefits of individual manualized CBT in older victims of crime. To identify mental health problems in older victims of common crime, provide preliminary data on its prevalence, and conduct a feasibility randomized controlled trial (RCT) using mixed methods. Older victims, identified through police teams, were screened for symptoms of anxiety, depression or post-traumatic stress disorder (PTSD) one (n = 581) and 3 months (n = 486) after experiencing a crime. Screen positive participants were offered diagnostic interviews. Of these, 26 participants with DSM-IV diagnoses agreed to be randomized to Treatment As Usual (TAU) or TAU plus our manualized CBT informed Victim Improvement Package (VIP). The latter provided feedback on the VIP. Recruitment, assessment and intervention are feasible and acceptable. At 3 months 120/486 screened as cases, 33 had DSM-IV criteria for a psychiatric disorder; 26 agreed to be randomized to a pilot trial. There were trends in favour of the VIP in all measures except PTSD at 6 months post crime. This feasibility RCT is the first step towards improving the lives of older victims of common crime. Without intervention, distress at 3 and 6 months after a crime remains high. However, the well-received VIP appeared promising for depressive and anxiety symptoms, but possibly not posttraumatic stress disorder.
Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)
The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.
Lee, Cheol-Kwon; Lee, Dong-Young; Lee, Na-Young; Hwang, Young-Soo
The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities
i AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE CYBER WAR: MAINTAINING AND CONTROLLING THE “KEY CYBER TERRAIN” OF THE CYBERSPACE ...32 Table of Figures Figure 1. Cyberspace Planes with Representative Examples...4 Figure 2. Cyberspace Attack Surface
Yang, Banghua; Han, Zhijun; Zan, Peng; Wang, Qian
Classification methods are a crucial direction in the current study of brain-computer interfaces (BCIs). To improve the classification accuracy for electroencephalogram (EEG) signals, a novel KF-PP-SVM (kernel fisher, posterior probability, and support vector machine) classification method is developed. Its detailed process entails the use of common spatial patterns to obtain features, based on which the within-class scatter is calculated. Then the scatter is added into the kernel function of a radial basis function to construct a new kernel function. This new kernel is integrated into the SVM to obtain a new classification model. Finally, the output of SVM is calculated based on posterior probability and the final recognition result is obtained. To evaluate the effectiveness of the proposed KF-PP-SVM method, EEG data collected from laboratory are processed with four different classification schemes (KF-PP-SVM, KF-SVM, PP-SVM, and SVM). The results showed that the overall average improvements arising from the use of the KF-PP-SVM scheme as opposed to KF-SVM, PP-SVM and SVM schemes are 2.49%, 5.83 % and 6.49 % respectively.
partnerships include the local police service, police authority, local authority, fire and rescue service , and NHS Primary Care Trust. vi...in the Crime and Disorder Agenda, see the Merseyside Fire and Rescue Service Fire Response Group. RAND Europe Partnership working 8 2.2.7 Re...Primary Care Trust • West Yorkshire Fire and Rescue Service • West Yorkshire Police • West Yorkshire Policing Authority • West Yorkshire Probation
McCreary, T. J.; Hsu, A.
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant and distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to
Ossowski, Andrzej; Diepenbroek, Marta; Kupiec, Tomasz; Bykowska-Witowska, Milena; Zielińska, Grażyna; Dembińska, Teresa; Ciechanowicz, Andrzej
As the result of the communist terror in Poland, during years 1944-1956 more than 50,000 people died. Their bodies were buried secretly, and most places are still unknown. The research presents the results of identification of people buried in one of many mass graves, which were found at the cemetery Powązki Military in Warsaw, Poland. Exhumation revealed the remains of eight people, among which seven were identified genetically. Well-preserved molars were used for the study. Reference material was collected from the closest living relatives. In one case, an exhumation of victim's parents had to be performed. DNA from swabs was extracted with a PrepFiler ® BTA Forensic DNA Extraction Kit and organic method. Autosomal, Y-STR amplification, and mtDNA sequencing were performed. The biostatistical calculations resulted in LR values from 1608 to 928 × 10 18 . So far, remains of more than 50 victims were identified. © 2016 American Academy of Forensic Sciences.
journals : Final Report Proceedings: Cyber Science, Biometrics and Digital Forensics: Workshop on Emerging Cyber Techniques and Technologies Report...and Digital Forensics. Through this one-day workshop, over fifteen feature presentations were made and the group held two Panels to discuss...09-2016 10-Jul-2015 9-Jul-2016 Final Report Proceedings: Cyber Science, Biometrics and Digital Forensics: Workshop on Emerging Cyber Techniques and
Marcotte, Dave E; Markowitz, Sara
In this paper we consider possible links between the diffusion of new pharmaceuticals used for treating mental illness and crime rates. We describe recent trends in crime and review the evidence showing that mental illness is a clear risk factor both for criminal behavior and victimization. We summarize the development of a number of new pharmaceutical therapies for the treatment of mental illness that came into wide use during the “great American crime decline.” We examine limited international data, as well as more detailed American data, to assess the relationship between rates of prescriptions of psychotropic drugs and crime rates, while controlling for other factors that may explain trends in crime rates. Using state-level variation in the rates that various drug therapies disperse within populations to identify impacts on crime rates, we find some evidence that the expansion of psychiatric drugs is associated with decreased violent crime rates, but not property crime rates. We find no robust impacts on homicide rates and no effects on arrest rates. Further, the magnitudes of the estimated effects of expanded drug treatment on violent crime are small. Our estimates imply that about 5 percent of the decline in crime during the period of our study was due to expanded mental health treatment.
Secure Multiparty Computation for Cooperative Cyber Risk Assessment Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, Sophia Yakoubov, Arkady...that the organizations can compute relevant statistics and analyses on the global infrastructure while still keeping the details of their local...and Engineering (ASDR&E) under Air Force Contract FA8721-05-C-0002. Opinions, interpretations, conclusions and recommendations are those of the author
Full Text Available This paper looks into the relationship between crime against property and labor markets. Drawing on various sources, the author analyzes the hypothesis that weaknesses in labor markets spur a surge in criminality, and he specially tests the hypothesis that unemployed people are those who commit most crimes against property. Based on aggregated data about tendencies in Mexico, and more specifi cally using data from surveys of prison population, it is shown that a majority of those who commit more crimes also work regularly. An econometric estimate identifi es some of the factors explaining to what extent these criminals can be called “professional criminals”. It
Cassidy, Wanda; Brown, Karen; Jackson, Margaret
Cyber bullying among youth is rapidly becoming a global phenomenon, as educators, parents and policymakers grapple with trying to curtail this negative and sometimes devastating behavior. Since most cyber bullying emanates from the home computer, parents can play an important role in preventing cyber bullying and in fostering a kinder online…
Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School
While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.
Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.
Full Text Available In the nineties of the last century it was noticed in the U.S.A. that suddenly the number of crimes with violence in the inter-racial and inter-ethnical conflicts rose. Also the phenomenon of ignition of churches, religious and sacral objects, especially in the south of the U.S.A., objects which were used by black people, was recorded. Directly in relation to that - the term „hate crimes“ then arose in science and became outspread very quickly, primarily in criminology. Several events, and above all the murder of a young homosexual in Wyoming influenced for both the violence and the crimes commited towards the homosexuals and all due to the prejudices towards this sexual minority to be included in this term. Today, this term is used not only in the U.S.A. and not only in a criminological sense, but also in a purely legal sense to denote the crimes which were carried out under the influence of hate towards a correspondent racial, ethnical or sexual minority. This term is linked also to the terminology and thus the problems which are related to the „hate speech“. The author of this paper writes about how this term arose in the first place and which problems emerge related to hate crimes and primarily in relation to the issues of expansion of democracy and tolerance, and also education, primarily among the police force and the young population. The author also ascertains that only with the law, no great effects in the battle against this phenomenon can be achieved and that before the criminal-legal intervention some other measures have to be approached, like the creation of an atmosphere of tolerance and the education of the citizens about the phenomenon of hate crimes.
Full Text Available The existing material classification is proposed to improve the inventory management. However, different materials have the different quality-related attributes, especially in the aircraft industry. In order to reduce the cost without sacrificing the quality, we propose a quality-oriented material classification system considering the material quality character, Quality cost, and Quality influence. Analytic Hierarchy Process helps to make feature selection and classification decision. We use the improved Kraljic Portfolio Matrix to establish the three-dimensional classification model. The aircraft materials can be divided into eight types, including general type, key type, risk type, and leveraged type. Aiming to improve the classification accuracy of various materials, the algorithm of Support Vector Machine is introduced. Finally, we compare the SVM and BP neural network in the application. The results prove that the SVM algorithm is more efficient and accurate and the quality-oriented material classification is valuable.
Nayef, Nibal; Breuel, Thomas M.
Symbol spotting is important for automatic interpretation of technical line drawings. Current spotting methods are not reliable enough for such tasks due to low precision rates. In this paper, we combine a geometric matching-based spotting method with an SVM classifier to improve the precision of the spotting. In symbol spotting, a query symbol is to be located within a line drawing. Candidate matches can be found, however, the found matches may be true or false. To distinguish a false match, an SVM classifier is used. The classifier is trained on true and false matches of a query symbol. The matches are represented as vectors that indicate the qualities of how well the query features are matched, those qualities are obtained via geometric matching. Using the classification, the precision of the spotting improved from an average of 76.6% to an average of 97.2% on a database of technical line drawings.
Full Text Available This paper presents an approach for the medium-term load forecasting using Support Vector Machines (SVMs. The proposed SVM model was employed to predict the maximum daily load demand for the period of a month. Analyses of available data were performed and the most important features for the construction of SVM model are selected. It was shown that the size and the structure of the training set may significantly affect the accuracy of predictions. The presented model was tested by applying it on real-life load data obtained from distribution company 'ED Jugoistok' for the territory of city Niš and its surroundings. Experimental results show that the proposed approach gives acceptable results for the entire period of prediction, which are in range with other solutions in this area.
M. Jaya Bharata Reddy
Full Text Available This paper proposes a smart fault detection, classification and location (SFDCL methodology for transmission systems with multi-generators using discrete orthogonal Stockwell transform (DOST. The methodology is based on synchronized current measurements from remote telemetry units (RTUs installed at both ends of the transmission line. The energy coefficients extracted from the transient current signals due to occurrence of different types of faults using DOST are being utilized for real-time fault detection and classification. Support vector machine (SVM has been deployed for locating the fault distance using the extracted coefficients. A comparative study is performed for establishing the superiority of SVM over other popular computational intelligence methods, such as adaptive neuro-fuzzy inference system (ANFIS and artificial neural network (ANN, for more precise and reliable estimation of fault distance. The results corroborate the effectiveness of the suggested SFDCL algorithm for real-time transmission line fault detection, classification and localization.
Aida Baghbany Oskouei
Full Text Available This paper suggests extended algorithms for multilevel trans-Z-source inverter. These algorithms are based on space vector modulation (SVM, which works with high switching frequency and does not generate the mean value of the desired load voltage in every switching interval. In this topology the output voltage is not limited to dc voltage source similar to traditional cascaded multilevel inverter and can be increased with trans-Z-network shoot-through state control. Besides, it is more reliable against short circuit, and due to several number of dc sources in each phase of this topology, it is possible to use it in hybrid renewable energy. Proposed SVM algorithms include the following: Combined modulation algorithm (SVPWM and shoot-through implementation in dwell times of voltage vectors algorithm. These algorithms are compared from viewpoint of simplicity, accuracy, number of switching, and THD. Simulation and experimental results are presented to demonstrate the expected representations.
Zoellner, Frank G.; Schad, Lothar R.; Emblem, Kyrre E.; Harvard Medical School, Boston, MA; Oslo Univ. Hospital
We investigated the predictive power of feature reduction analysis approaches in support vector machine (SVM)-based classification of glioma grade. In 101 untreated glioma patients, three analytic approaches were evaluated to derive an optimal reduction in features; (i) Pearson's correlation coefficients (PCC), (ii) principal component analysis (PCA) and (iii) independent component analysis (ICA). Tumor grading was performed using a previously reported SVM approach including whole-tumor cerebral blood volume (CBV) histograms and patient age. Best classification accuracy was found using PCA at 85% (sensitivity = 89%, specificity = 84%) when reducing the feature vector from 101 (100-bins rCBV histogram + age) to 3 principal components. In comparison, classification accuracy by PCC was 82% (89%, 77%, 2 dimensions) and 79% by ICA (87%, 75%, 9 dimensions). For improved speed (up to 30%) and simplicity, feature reduction by all three methods provided similar classification accuracy to literature values (∝87%) while reducing the number of features by up to 98%. (orig.)
Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.
When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security community to look for enhancements to traditional security controls. Cyber Threat Intelligence represents one such proactive approach and includes the collection and analysis of information for potential threats from multiple diverse sources of data. The objective is to understand the methodology that different threat actors are using to launch their campaigns, and proactively adapt security cont...
Air Force CyberWorx offers facilitated design thinking sessions that bring stakeholders, industry and academic experts together to develop...career cyber officers, will relay the orders and help work priorities for units to the best of her abilities while motivating those below her...to use of a collaborative network forum, like an improved MilSuite. This will ultimately increase the sharing of information among cyber squadrons
Gross, Michael L; Canetti, Daphna; Vashdi, Dana R
When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.
countries and adjust- ing internal markets are measures that can be used for defense. Offense may restrictively be applied at the cyber level. However...willing to receive the punishment. Meanwhile, evidence col- lection for digital forensics gets started. Determinant of the situation, a cyber...attribution and precise targeting, which can support evidence collection for digital forensic investigation. Conclusion The cyber domain needs a new
Validation of the Alcohol Use Disorders Identification Test and the Drug Use Disorders Identification Test in a Swedish sample of suspected offenders with signs of mental health problems: results from the Mental Disorder, Substance Abuse and Crime study.
Durbeej, Natalie; Berman, Anne H; Gumpert, Clara H; Palmstierna, Tom; Kristiansson, Marianne; Alm, Charlotte
Substance abuse is common among offenders. One method widely used for the detection of substance abuse is screening. This study explored the concurrent validity of the Alcohol Use Disorders Identification Test (AUDIT) and the Drug Use Disorders Identification Test (DUDIT) screening tools in relation to (a) substance abuse and dependency diagnoses and (b) three problem severity domains of the sixth version of the Addiction Severity Index in a sample of 181 suspected offenders with signs of mental health problems. The screening tools showed moderate to high accuracy for identification of dependency diagnoses. The AUDIT was associated with alcohol problem severity, whereas the DUDIT was associated with drug and legal problem severity. Administering the screening tools in the current population yields valid results. However, the suggested cutoff scores should be applied with caution due to the discrepancy between present and previous findings. Copyright © 2010 Elsevier Inc. All rights reserved.
Jung, Hyunzee; Herrenkohl, Todd I; Klika, J Bart; Lee, Jungeun Olivia; Brown, Eric C
Bivariate analyses of adult crime and child maltreatment showed that individuals who had been maltreated as children, according to child welfare reports, subsequently committed more crime than others who had not been maltreated. Analyses of crimes by category-property, person, and society-provided further evidence of a link between child maltreatment and crime at the bivariate level. Tests of gender differences showed that crime generally is more prevalent among males, although females with a history of maltreatment were more likely than those in a no-maltreatment (comparison) group to report having had some prior involvement in crime. Surprisingly, multivariate analyses controlling for childhood socioeconomic status, gender, minority racial status, marital status, and education level showed that, with one exception (crimes against society), the significant association between child maltreatment and crime observed in bivariate tests was not maintained. Implications for future research are discussed. © The Author(s) 2014.
Prieto Curiel, Rafael; Bishop, Steven
How secure people feel in a particular region is obviously linked to the actual crime suffered in that region but the exact relationship between crime and its fear is quite subtle. Two regions may have the same crime rate but their local perception of security may differ. Equally, two places may have the same perception of security even though one may have a significantly lower crime rate. Furthermore, a negative perception might persist for many years, even when crime rates drop. Here, we develop a model for the dynamics of the perception of security of a region based on the distribution of crime suffered by the population using concepts similar to those used for opinion dynamics. Simulations under a variety of conditions illustrate different scenarios and help us determine the impact of suffering more, or less, crime. The inhomogeneous concentration of crime together with a memory loss process is incorporated into the model for the perception of security, and results explain why people are often more fearful than actually victimized; why a region is perceived as being insecure despite a low crime rate; and why a decrease in the crime rate might not significantly improve the perception of security.
How secure people feel in a particular region is obviously linked to the actual crime suffered in that region but the exact relationship between crime and its fear is quite subtle. Two regions may have the same crime rate but their local perception of security may differ. Equally, two places may have the same perception of security even though one may have a significantly lower crime rate. Furthermore, a negative perception might persist for many years, even when crime rates drop. Here, we develop a model for the dynamics of the perception of security of a region based on the distribution of crime suffered by the population using concepts similar to those used for opinion dynamics. Simulations under a variety of conditions illustrate different scenarios and help us determine the impact of suffering more, or less, crime. The inhomogeneous concentration of crime together with a memory loss process is incorporated into the model for the perception of security, and results explain why people are often more fearful than actually victimized; why a region is perceived as being insecure despite a low crime rate; and why a decrease in the crime rate might not significantly improve the perception of security. PMID:28804260
This paper investigates the Swedish tax authority’s (Skatteverkets) compliance initiative called Preventing Financial Crime. In Sweden tax evasion related to organised moon-lighting is defined as a major risk to the revenue collection and to the legitimacy of Skatteverket. The traditional approach...... to abating such tax evasion has been reformed and a new mix-method approach adopted. This approach combines a proactive strategy—Preventing Financial Crime—with a reactive inspection strategy. During one a month of intensive fieldwork in Sweden, I studied the daily work in Preventing Financial Crime. Based...... on this, the paper shows that the Swedish tax officials seek to motivate large construction contractors and municipalities to take preventive measures in relation to their sub-contractors to avoid and abate tax evasion. The paper shows the challenges in engaging and involving these external stakeholders...
Full Text Available The present paper tries to put together a modest study on the actions taken at EU level in order to fight economic crime. A series of measures have been implemented at national and European level to create a framework for fighting criminality. The European institutions and the national authorities are improving their cooperation in order to fight the increasing number of economic crimes committed both in the private and public sector, while Member States are approximating their legislation to the provisions of the Community acquis. We have divided these efforts into five categories corresponding to the five main areas of economic crime identified at EU level: fight against fraud, which affects the financial interests of the European Union and mainly comprises fraudulent practices in the use of EU funds and in taxation, fight against piracy and counterfeiting, public and private corruption, money laundering and organised crime. In order to combat the negative influence criminality exerts on the development of the economy and of the overall society, for each of the above mentioned areas legislative, institutional, technical and administrative measures have been adopted. We have presented these measures considering their efficiency in meeting the targets set out and the role played in their implementation by the European and national institutions.
Wiśniewski, Remigiusz; Bazydło, Grzegorz; Szcześniak, Paweł
The paper proposes a technique of hardware realization of a space vector modulation (SVM) of state function switching in matrix converter (MC), oriented on the implementation in a single field programmable gate array (FPGA). In MC the SVM method is based on the instantaneous space-vector representation of input currents and output voltages. The traditional computation algorithms usually involve digital signal processors (DSPs) which consumes the large number of power transistors (18 transistors and 18 independent PWM outputs) and "non-standard positions of control pulses" during the switching sequence. Recently, hardware implementations become popular since computed operations may be executed much faster and efficient due to nature of the digital devices (especially concurrency). In the paper, we propose a hardware algorithm of SVM computation. In opposite to the existing techniques, the presented solution applies COordinate Rotation DIgital Computer (CORDIC) method to solve the trigonometric operations. Furthermore, adequate arithmetic modules (that is, sub-devices) used for intermediate calculations, such as code converters or proper sectors selectors (for output voltages and input current) are presented in detail. The proposed technique has been implemented as a design described with the use of Verilog hardware description language. The preliminary results of logic implementation oriented on the Xilinx FPGA (particularly, low-cost device from Artix-7 family from Xilinx was used) are also presented.
Full Text Available Voltage stability is an important problem in power system networks. In this paper, in terms of static voltage stability, and application of Neural Networks (NN and Supported Vector Machine (SVM for estimating of voltage stability margin (VSM and predicting of voltage collapse has been investigated. This paper considers voltage stability in power system in two parts. The first part calculates static voltage stability margin by Radial Basis Function Neural Network (RBFNN. The advantage of the used method is high accuracy in online detecting the VSM. Whereas the second one, voltage collapse analysis of power system is performed by Probabilistic Neural Network (PNN and SVM. The obtained results in this paper indicate, that time and number of training samples of SVM, are less than NN. In this paper, a new model of training samples for detection system, using the normal distribution load curve at each load feeder, has been used. Voltage stability analysis is estimated by well-know L and VSM indexes. To demonstrate the validity of the proposed methods, IEEE 14 bus grid and the actual network of Yazd Province are used.
Dror G. Feitelson
Full Text Available The services provided by digital libraries can be much improved by correctly identifying variants of the same name. For example, this will allow for better retrieval of all the works by a certain author. We focus on variants caused by abbreviations of first names, and show that significant achievements are possible by simple lexical analysis and comparison of names. This is done in two steps: first a pairwise matching of names is performed, and then these are used to find cliques of equivalent names. However, these steps can each be performed in a variety of ways. We therefore conduct an experimental analysis using two real datasets to find which approaches actually work well in practice. Interestingly, this depends on the size of the repository, as larger repositories may have many more similar names.
Ludwig, Jens; Kling, Jeffrey R.
Understanding whether criminal behavior is %u201Ccontagious%u201D is important for law enforcement and for policies that affect how people are sorted across social settings. We test the hypothesis that criminal behavior is contagious by using data from the Moving to Opportunity (MTO) randomized housing-mobility experiment to examine the extent to which lower local-area crime rates decrease arrest rates among individuals. Our analysis exploits the fact that the effect of treatment group assign...
This paper examines the relationship between gun ownership and crime. Previous research has suffered from a lack of reliable data on gun ownership. I exploit a unique data set to reliably estimate annual gun ownership rates at both the state and the county level during the past two decades. My findings demonstrate that changes in gun ownership are significantly positively related to changes in the homicide rate, with this relationship driven entirely by the impact of gun ownership on murders ...
Hidajat, Monica; Adam, Angry Ronald; Danaparamita, Muhammad; Suhendrik, Suhendrik
The purpose of this research is to review two journals about social media effect for cyberbullying. First Journal is written by Eddie Fisher with the title From Cyber Bullying to Cyber Coping: The Misuse of Mobile Technology and Social Media and Their Effects on People’s Lives and the second journal is written by ReginaldH. Gonzales with the title Social Media as a Channel and its Implications on Cyber Bullying. First Journal focus on condition and cyber bullying state by interview respondent...
To maintain the cyber security, nuclear digital Instrumentation and Control (I and C) systems must be analyzed for security risks because a single security breach due to a cyber attack can cause system failure, which can have catastrophic consequences on the environment and staff of a Nuclear Power Plant (NPP). Attack trees have been widely used to analyze the cyber security of digital systems due to their ability to capture system specific as well as attacker specific details. Therefore, a methodology based on attack trees has been proposed to analyze the cyber security of the systems. The methodology has been applied for the Cyber Security Analysis (CSA) of a Bistable Processor (BP) of a Reactor Protection System (RPS). Threats have been described according to their source. Attack scenarios have been generated using the attack tree and possible counter measures according to the Security Risk Level (SRL) of each scenario have been suggested. Moreover, cyber Security Requirements (SRs) have been elicited, and suitability of the requirements has been checked. (author)
Dorman, E., E-mail: Erik.Dorman@areva.com [AREVA Inc., Cyber Security Solutions, Charlotte, NC (United States)
The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NRC. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. The Program is designed to protect critical digital assets (CDAs) by applying and maintaining defense-in depth protective strategies to ensure the capability to detect, respond to, and recover from cyber-attacks. The Program references NEI 08-09 R. 6, the Nuclear Energy Institute Template that provides guidance for applying Cyber Security controls derived from NIST 800-53/82 and slightly modified to fit the nuclear environment. Many mature processes are in place at nuclear facilities in response to numerous regulations implemented over the past 30 years. Many of these processes such as the Physical Security Program offer protections that are leveraged to protect the functions of critical digital assets from unauthorized physical access. Other processes and technology such as engineering design control, work management and pre-job briefs, control of portable media and mobile devices, and deterministically segregated networks protect critical digital assets. By leveraging the regulated nuclear environment, integrating NIST type Cyber Security controls, and prudently deploying technology the Cyber Security posture of operating nuclear facilities supports on-demand base load electricity 24/7 with capacity factors exceeding 85%. This paper is designed to provide a glimpse into Cyber Security Programs that support safe operation and reliability in the regulated nuclear environment while supporting the on-demand base load electricity production 24/7. (author)
Benjamin H Brinkmann
Full Text Available Management of drug resistant focal epilepsy would be greatly assisted by a reliable warning system capable of alerting patients prior to seizures to allow the patient to adjust activities or medication. Such a system requires successful identification of a preictal, or seizure-prone state. Identification of preictal states in continuous long- duration intracranial electroencephalographic (iEEG recordings of dogs with naturally occurring epilepsy was investigated using a support vector machine (SVM algorithm. The dogs studied were implanted with a 16-channel ambulatory iEEG recording device with average channel reference for a mean (st. dev. of 380.4 (+87.5 days producing 220.2 (+104.1 days of intracranial EEG recorded at 400 Hz for analysis. The iEEG records had 51.6 (+52.8 seizures identified, of which 35.8 (+30.4 seizures were preceded by more than 4 hours of seizure-free data. Recorded iEEG data were stratified into 11 contiguous, non-overlapping frequency bands and binned into one-minute synchrony features for analysis. Performance of the SVM classifier was assessed using a 5-fold cross validation approach, where preictal training data were taken from 90 minute windows with a 5 minute pre-seizure offset. Analysis of the optimal preictal training time was performed by repeating the cross validation over a range of preictal windows and comparing results. We show that the optimization of feature selection varies for each subject, i.e. algorithms are subject specific, but achieve prediction performance significantly better than a time-matched Poisson random predictor (p<0.05 in 5/5 dogs analyzed.
Watkins, Laura E; Maldonado, Rosalita C; DiLillo, David
The purpose of this study was to develop and provide initial validation for a measure of adult cyber intimate partner aggression (IPA): the Cyber Aggression in Relationships Scale (CARS). Drawing on recent conceptual models of cyber IPA, items from previous research exploring general cyber aggression and cyber IPA were modified and new items were generated for inclusion in the CARS. Two samples of adults 18 years or older were recruited online. We used item factor analysis to test the factor structure, model fit, and invariance of the measure structure across women and men. Results confirmed that three-factor models for both perpetration and victimization demonstrated good model fit, and that, in general, the CARS measures partner cyber aggression similarly for women and men. The CARS also demonstrated validity through significant associations with in-person IPA, trait anger, and jealousy. Findings suggest the CARS is a useful tool for assessing cyber IPA in both research and clinical settings. © The Author(s) 2016.
Full Text Available Maximum likelihood classifier (MLC and support vector machines (SVM are two commonly used approaches in machine learning. MLC is based on Bayesian theory in estimating parameters of a probabilistic model, whilst SVM is an optimization based nonparametric method in this context. Recently, it is found that SVM in some cases is equivalent to MLC in probabilistically modeling the learning process. In this paper, MLC and SVM are combined in learning and classification, which helps to yield probabilistic output for SVM and facilitate soft decision making. In total four groups of data are used for evaluations, covering sonar, vehicle, breast cancer, and DNA sequences. The data samples are characterized in terms of Gaussian/non-Gaussian distributed and balanced/unbalanced samples which are then further used for performance assessment in comparing the SVM and the combined SVM-MLC classifier. Interesting results are reported to indicate how the combined classifier may work under various conditions.
subject, using Medline and Lilacs as data bases, covering the period of 1986 the 2006. The keywords used had been: "Alcoholism", "drug dependence", "drug abuses" and "crime". Summaries of congresses, articles and excellent books on the subject, published for different authorities in the subject, in diverse phases of research, had been consulted and enclosed. CONCLUSION: The diverse research coincide in the affirmation of an association between psychoactive substances use disorders and crime. What it is possible to evidence is the high ratio of violent acts when the alcohol or the illicit drugs is used by aggressors, its victims or in both. When it carries through an expert examination in authors who allege some relation of the practiced act with alcohol consumption/drugs, this exam must take in consideration the substance in use, the clinical symptom for caused it, as well as verifying the presence of a diagnosis, the existence of causal nexus and possible alterations in the understanding capacity and/or determination of the agent.
Full Text Available The author in this work elaborates some problems about complicity in the committing a crimes. Criminal act is the act committed mostly by one person. But, today, there is more and more felonies which who are committing by several peoples, or groups of people. Therefore, the sanction must be more rigorous. In this article, author discussed about a one side of the complicity, accordingly, about a assistance in committing a crimes. Through analyses theoretical postulates in Codex trans aspects of some other authors till jurisprudence, the author concludes that this subject matter is very good elaborate, and, there is no many problems in practice. The author propose a harmonization of solutions on some aspects between the countries in the ambience, and demand more severe regard from court. The assistance in committing crime is the easiest shape of the complicity, but no less remarkable.
Kuznetsova I. A.
Full Text Available The article deals with the analysis of the changes contributed by the lawmaker to the RF Criminal Code. Here are distinguished contradictory and collision norms, the problems of their qualification. Some scientific points of view are quoted. The authors offer the ways of solving problematic issues connected with strengthening of the responsibility for crimes of sexual character committed in relation to non-adults
Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory
Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.
Chan, Tony; Jameson, Leland
It is often said that numerical simulation is third in the group of three ways to explore modern science: theory, experiment and simulation. Carefully executed modern numerical simulations can, however, be considered at least as relevant as experiment and theory. In comparison to physical experimentation, with numerical simulation one has the numerically simulated values of every field variable at every grid point in space and time. In comparison to theory, with numerical simulation one can explore sets of very complex non-linear equations such as the Einstein equations that are very difficult to investigate theoretically. Cyber-enabled scientific discovery is not just about numerical simulation but about every possible issue related to scientific discovery by utilizing cyberinfrastructure such as the analysis and storage of large data sets, the creation of tools that can be used by broad classes of researchers and, above all, the education and training of a cyber-literate workforce
development of aircraft routes, consideration of defenses, etc. 3. Timing and Deconfliction: The choreography of the attacks is analyzed to insure...consideration of cyber defenses, and weapon application. As an example, the use of Stuxnet to degrade Iran’s nuclear enrichment program highlights... program , the program would lie dormant. It was also designed to delete itself from thumb drives after infecting three machines, and it contained a
Matthew Rose worked at the Naval Postgraduate School as a graphic designer from February 2002-November 2011. His work for NPS included logos, brochures, business packs, movies/presentations, posters, the CyberSiege video game and many other projects. This material was organized and provided by the artist, for inclusion in the NPS Archive, Calhoun. Includes these files: Backgrounds; Global War; Original; Working; Working Graphics
The Strategic Studies Institute and U.S. Army War College Press publishes a monthly email newsletter to update the national security community on...Consequences Unit Cyber-Security Check List, in a version last updated in 2007;19 ISKE, based on German documentation as described previously; and the...United Kingdom (UK) Centre for the Protec- tion of National Infrastructure (CPNI) Guidelines on Supervisory Control and Data Acquisition ( SCADA
Lampoltshammer, Thomas J; Kounadi, Ourania; Sitko, Izabela; Hawelka, Bartosz
Public media such as TV or newspapers, paired with crime statistics from the authority, raise awareness of crimes within society. However, in today's digital society, other sources rapidly gain importance as well. The Internet and social networks act heavily as information distribution platforms. Therefore, this paper aims at exploring the influence of the social Web service Twitter as an information distribution platform for crime news. In order to detect messages with crime-related contents, the Links Correspondence Method (LCM) is introduced, which gathers and investigates Twitter messages related to crime articles via associated Web links. Detected crime tweets are analysed in regard to the distance between the location of an incident and the location of associated tweets, as well as regards demographic aspects of the corresponding crime news. The results show that there exists a spatial dependency regarding the activity space of a user (and the crime-related tweets of this user) and the actual location of the crime incident. Furthermore, the demographic analysis indicates that the type of a crime as well as the gender of the victim has great influence on whether the crime incident is spread via Twitter or not.
Lampoltshammer, Thomas J.; Kounadi, Ourania; Sitko, Izabela; Hawelka, Bartosz
Public media such as TV or newspapers, paired with crime statistics from the authority, raise awareness of crimes within society. However, in today's digital society, other sources rapidly gain importance as well. The Internet and social networks act heavily as information distribution platforms. Therefore, this paper aims at exploring the influence of the social Web service Twitter as an information distribution platform for crime news. In order to detect messages with crime-related contents, the Links Correspondence Method (LCM) is introduced, which gathers and investigates Twitter messages related to crime articles via associated Web links. Detected crime tweets are analysed in regard to the distance between the location of an incident and the location of associated tweets, as well as regards demographic aspects of the corresponding crime news. The results show that there exists a spatial dependency regarding the activity space of a user (and the crime-related tweets of this user) and the actual location of the crime incident. Furthermore, the demographic analysis indicates that the type of a crime as well as the gender of the victim has great influence on whether the crime incident is spread via Twitter or not. PMID:25843991
Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.
This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.
Full Text Available The process of economic transition in Serbia has highlighted the problem of socially responsible behavior of corporations and especially the growing phenomenon of corporate crime. The consequences of corporate wrongdoing are almost everywhere and cannot be overseen. The most tremendous ones are those related to human casualties, environmental disasters, long-term negative health effects and great material budget losses on local and state levels. The fact that corporations are profiting from criminal activity which causes enormous damage to society and individuals makes public policy makers face the ultimate choice - either to devise new effective measures for reducing and controlling this phenomenon or to retain the standard model of crime control, in accordance with the principles of classical criminal law. The first choice would require one of the pillars of criminal law - the principle of individual and subjective guilt of physical persons as the exclusive grounds for imposing criminal liability - to be either modified and widened in order to be used as a base for imposing corporate criminal liability or partially changed by new criminal law categories which would introduce different grounds for imposing criminal liability on an organization. The second choice would require the decision-makers to refuse to change old and well-established principles. The criminal reality, however, has made most legislatures in Europe and around the world choose the first option and introduce different forms of corporate criminal liability. Serbian criminal legislation has been headed in the same direction since 2008, when it was changed in order to enable the imposing of liability for criminal acts on corporations. However, although corporate criminal liability is becoming the European legislative standard, one question remains - Is this the only measure of criminal politics which can be used as a means of reducing and preventing corporate crime? The authors
Wu, Gui-Fang; He, Yong
The aim of the present paper was to provide new insight into Vis/NIR spectroscopic analysis of textile fibers. In order to achieve rapid identification of the varieties of fibers, the authors selected 5 kinds of fibers of cotton, flax, wool, silk and tencel to do a study with Vis/NIR spectroscopy. Firstly, the spectra of each kind of fiber were scanned by spectrometer, and principal component analysis (PCA) method was used to analyze the characteristics of the pattern of Vis/NIR spectra. Principal component scores scatter plot (PC1 x PC2 x PC3) of fiber indicated the classification effect of five varieties of fibers. The former 6 principal components (PCs) were selected according to the quantity and size of PCs. The PCA classification model was optimized by using the least-squares support vector machines (LS-SVM) method. The authors used the 6 PCs extracted by PCA as the inputs of LS-SVM, and PCA-LS-SVM model was built to achieve varieties validation as well as mathematical model building and optimization analysis. Two hundred samples (40 samples for each variety of fibers) of five varieties of fibers were used for calibration of PCA-LS-SVM model, and the other 50 samples (10 samples for each variety of fibers) were used for validation. The result of validation showed that Vis/NIR spectroscopy technique based on PCA-LS-SVM had a powerful classification capability. It provides a new method for identifying varieties of fibers rapidly and real time, so it has important significance for protecting the rights of consumers, ensuring the quality of textiles, and implementing rationalization production and transaction of textile materials and its production.
A successful cyber-physical system, a complex interweaving of hardware and software in direct interaction with some parts of the physical environment, relies heavily on proper identification of the, often pre-existing, physical elements. Based on information from that process, a bespoke “cyber” part of the system may then be designed for a specific purpose. Optimal Mobile Sensing and Actuation Strategies in Cyber-physical Systems focuses on distributed-parameter systems the dynamics of which can be modelled with partial differential equations. Such systems are very challenging to measure, their states being distributed throughout a spatial domain. Consequently, optimal strategies are needed and systematic approaches to the optimization of sensor locations have to be devised for parameter estimation. The text begins by reviewing the newer field of cyber-physical systems and introducing background notions of distributed parameter systems and optimal observation theory. New research opportunities are then de...
Full text: The spread of new communication and computer technologies is now the potential for a dedicated, sophisticated adversary to conduct coordinated strikes against the computers, communications systems, and databases of nuclear material security systems. All weapons of cyber war, like viruses, Trojans, access to computer systems are potential risks for the security of nuclear material. New forms of destruction of electronic devices, e.g. Transient Electromagnetic Devices (TED), that could, in the hands of enemies, criminals, or terrorist pose a significant threat to nuclear safety infrastructure components that are based on micro-circuits and computer or micro-processor control. These examples shows the necessity to clearly identify possible risks as: information and communication based disorders and other disruptions and attacks; partial or complete failure of systems causing the risk of unexpected reaction or unmanageable situations; cracking of access codes and elimination of alarm equipment could give easy access to nuclear material; computer manipulation or complete computer and system takeover due to brute force attacks, viruses, Trojans and worms could lead to malfunctions, disruptions and nuclear disasters; computer spying and brute force attacks could give detailed information about technical, organizational and organizational data; combined actions of physical, electronic and computer attacks. The paper gives an overview of potential computer and communication safety gaps and points out strategic implications as the identification of the critical infrastructure, surveillance of computer systems, data access and communication paths. The basic necessity of the development of computer and communication breakdown backup systems as well as measures of precaution against cyber attacks is shown in the paper. (author)
Full Text Available The identification of phenotype descriptions in the scientific literature, case reports and patient records is a rewarding task for bio-medical text mining. Any progress will support knowledge discovery and linkage to other resources. However because of their wide variation a number of challenges still remain in terms of their identification and semantic normalisation before they can be fully exploited for research purposes. This paper presents novel techniques for identifying potential complex phenotype mentions by exploiting a hybrid model based on machine learning, rules and dictionary matching. A systematic study is made of how to combine sequence labels from these modules as well as the merits of various ontological resources. We evaluated our approach on a subset of Medline abstracts cited by the Online Mendelian Inheritance of Man database related to auto-immune diseases. Using partial matching the best micro-averaged F-score for phenotypes and five other entity classes was 79.9%. A best performance of 75.3% was achieved for phenotype candidates using all semantics resources. We observed the advantage of using SVM-based learn-to-rank for sequence label combination over maximum entropy and a priority list approach. The results indicate that the identification of simple entity types such as chemicals and genes are robustly supported by single semantic resources, whereas phenotypes require combinations. Altogether we conclude that our approach coped well with the compositional structure of phenotypes in the auto-immune domain.
Cooper, Antony K
Full Text Available for the prevention and management of crime. This paper describes two innovative techniques that were developed by CSIR for analysing crime: "crime clocks" and "target performance maps"....
Curtis, Glenn E; Elan, Seth L; Hudson, Rexford A; Kollars, Nina A
.... The report notes the participation of such groups in all major types of crime, including trafficking of human beings and various commodities, financial crimes, extortion, gambling, prostitution, and violent crimes...
While the high rate of crime in South Africa has received much international attention, mainly focused on violent crime, the vast majority of offences reported to the South African Police Service concern property and other non-violent offences. The present study explores the relationship between one of the most frequently ...
Marcotte, Dave E.; Markowitz, Sara
In this paper we consider possible links between the diffusion of new pharmaceuticals used for treating mental illness and crime rates. We describe recent trends in crime and review the evidence showing that mental illness is a clear risk factor both for criminal behavior and victimization. We summarize the development of a number of new…
Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.
This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…
hacker methods. Bill Gertz, “Inside the Ring: Hacker Training,” Washington Post, 4 March 2010. 9. Nigel Kendall, “Global cyber attacks on the rise: 75...Press, 2003). 46. Scott J. Shackelford, “From Nuclear War to Net War: Analogizing Cyber Attacks in Inter- national Law,” Berkeley Journal of
... interests routinely rely on the durability and security of IP-based networks to move capital and to track...-controlled network equipment, which are referred to as cyber security best practices. The Commission does not... losing customers to networks with better security practices. The reduced incentive for heightened cyber...
Irvine, Cynthia E.; Levin, Timothy E.
The objective of this research is to investigate architectural mechanisms to provide an emergency response capability for Cyber Infrastructure management through the use of distributed, highly secure, protected domains. Instead of creating a costly physically separate cyber domain, logical separation is used. This work developed an architecture and prototype demonstration in the context of an open source operating system.
Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling
Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…
This paper reports on the first major survey of cyber-bullying undertaken in Ireland. While preliminary results have been published they were based on a smaller and incomplete sample of 12-16 year olds living in Ireland. The preliminary results addressed the incidence level of cyber-bullying and that of the different subcategories of…
Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de
A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper
Full Text Available information security posture and to improve on it. The potential attack surface of a nation is extremely large however and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a...
Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.
In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.
Support vector machine (SVM) is an extensively used machine learning method with many biomedical signal classification applications. In this study, a novel PSO-SVM model has been proposed that hybridized the particle swarm optimization (PSO) and SVM to improve the EMG signal classification accuracy. This optimization mechanism involves kernel parameter setting in the SVM training procedure, which significantly influences the classification accuracy. The experiments were conducted on the basis of EMG signal to classify into normal, neurogenic or myopathic. In the proposed method the EMG signals were decomposed into the frequency sub-bands using discrete wavelet transform (DWT) and a set of statistical features were extracted from these sub-bands to represent the distribution of wavelet coefficients. The obtained results obviously validate the superiority of the SVM method compared to conventional machine learning methods, and suggest that further significant enhancements in terms of classification accuracy can be achieved by the proposed PSO-SVM classification system. The PSO-SVM yielded an overall accuracy of 97.41% on 1200 EMG signals selected from 27 subject records against 96.75%, 95.17% and 94.08% for the SVM, the k-NN and the RBF classifiers, respectively. PSO-SVM is developed as an efficient tool so that various SVMs can be used conveniently as the core of PSO-SVM for diagnosis of neuromuscular disorders. Copyright © 2013 Elsevier Ltd. All rights reserved.
Pirooznia, Mehdi; Deng, Youping
Graphical user interface (GUI) software promotes novelty by allowing users to extend the functionality. SVM Classifier is a cross-platform graphical application that handles very large datasets well. The purpose of this study is to create a GUI application that allows SVM users to perform SVM training, classification and prediction. The GUI provides user-friendly access to state-of-the-art SVM methods embodied in the LIBSVM implementation of Support Vector Machine. We implemented the java interface using standard swing libraries. We used a sample data from a breast cancer study for testing classification accuracy. We achieved 100% accuracy in classification among the BRCA1-BRCA2 samples with RBF kernel of SVM. We have developed a java GUI application that allows SVM users to perform SVM training, classification and prediction. We have demonstrated that support vector machines can accurately classify genes into functional categories based upon expression data from DNA microarray hybridization experiments. Among the different kernel functions that we examined, the SVM that uses a radial basis kernel function provides the best performance. The SVM Classifier is available at http://mfgn.usm.edu/ebl/svm/.
Sofia Amaral; Siddhartha Bandyopadhyay; Samrat Bhattacharyais; Rudra Sensarmais
This article has two goals. First, using district-level panel data we identify key determinants of violent crime, nonviolent crime, and crime against women in India, 1990-2007. Second, using district-level variation in regard to Maoist-driven social conflict, we examine how social conflict affects crime and its determinants. In addition to conventional determinants of crime (e.g., law enforcement and economic variables), we examine how variation in sex ratios affects crime. We also study whet...
Meza, Juan; Campbell, Scott; Bailey, David
The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.
Full Text Available The purpose of this research is to review two journals about social media effect for cyberbullying. First Journal is written by Eddie Fisher with the title From Cyber Bullying to Cyber Coping: The Misuse of Mobile Technology and Social Media and Their Effects on People’s Lives and the second journal is written by ReginaldH. Gonzales with the title Social Media as a Channel and its Implications on Cyber Bullying. First Journal focus on condition and cyber bullying state by interview respondents in law terms. Second journal focus on handling cyber bullying case at social media. Social medial cause few cases of cyberbullying increasing because of its characteristic that possible to spread information easily and fast. Socialization proper use of social media needs to be done to improve public awareness about the dangers of misuse of social media.