Skip to main content

Articles

Page 1 of 2

  1. This paper describes an approach for detecting the presence or emergence of organised crime (OC) signals on social media. It shows how words and phrases, used by members of the public in social media posts, ca...

    Authors: Simon Andrews, Ben Brewster and Tony Day
    Citation: Security Informatics 2018 7:3
  2. Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual data from the we...

    Authors: Hamidreza Alvari, Paulo Shakarian and J. E. Kelly Snyder
    Citation: Security Informatics 2017 6:1
  3. Currently 40 % of the world’s population, around 3 billion users, are online using cyberspace for everything from work to pleasure. While there are numerous benefits accompanying this medium, the Internet is n...

    Authors: Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith and Sadie Creese
    Citation: Security Informatics 2016 5:3
  4. Attackers increasingly take advantage of naive users who tend to treat non-executable files casually, as if they are benign. Such users often open non-executable files although they can conceal and perform mal...

    Authors: Nir Nissim, Aviad Cohen, Robert Moskovitch, Asaf Shabtai, Matan Edri, Oren BarAd and Yuval Elovici
    Citation: Security Informatics 2016 5:1
  5. DNSSEC offers protection against spoofing of DNS data by providing origin authentication, ensuring data integrity and authentication of non-existence by using public-key cryptography. Although the relevance of...

    Authors: Niels L. M. van Adrichem, Norbert Blenn, Antonio Reyes LĂşa, Xin Wang, Muhammad Wasif, Ficky Fatturrahman and Fernando A. Kuipers
    Citation: Security Informatics 2015 4:8
  6. Popular network scan detection algorithms operate through evaluating external sources for unusual connection patterns and traffic rates. Research has revealed evasive tactics that enable full circumvention of ...

    Authors: Richard E Harang and Peter Mell
    Citation: Security Informatics 2015 4:4
  7. Wildlife trafficking, a focus of organized transnational crime syndicates, is a threat to biodiversity. Such crime networks span beyond protected areas holding strongholds of species of interest such as Africa...

    Authors: Timothy C Haas and Sam M Ferreira
    Citation: Security Informatics 2015 4:2
  8. Effectively assessing and configuring security controls to minimize network risks requires human judgment. Little is known about what factors network professionals perceive to make judgments of network risk. T...

    Authors: Jennifer Cowley, Frank L. Greitzer and Bronwyn Woods
    Citation: Security Informatics 2015 4:1

    The Erratum to this article has been published in Security Informatics 2015 4:5

  9. The language of influence or propaganda has been studied for a century but its predictions (simplification, deceptiveness, manipulation) can now be examined empirically using corpus analytics. Semantic models ...

    Authors: David B Skillicorn and Edna F Reid
    Citation: Security Informatics 2014 3:9
  10. The nature of identity has changed dramatically in recent years and has grown in complexity. Identities are defined in multiple domains: biological and psychological elements strongly contribute, but biographi...

    Authors: Joe Bruce, Jean Scholtz, Duncan Hodges, Lia Emanuel, Danaë Stanton Fraser, Sadie Creese and Oriana J Love
    Citation: Security Informatics 2014 3:12
  11. The word “Paedophilia” has come a long way from its Greek origin of child-companionship to a Mental Disorder, Social Taboo and Criminal Offence. Various laws are in place to help control such behaviour, protec...

    Authors: Anna Vartapetiance and Lee Gillam
    Citation: Security Informatics 2014 3:3
  12. Methods and tools to conduct authorship analysis of web contents is of growing interest to researchers and practitioners in various security-focused disciplines, including cybersecurity, counter-terrorism, and...

    Authors: Victor Benjamin, Wingyan Chung, Ahmed Abbasi, Joshua Chuang, Catherine A Larson and Hsinchun Chen
    Citation: Security Informatics 2014 3:10
  13. We demonstrate how one can generate predictions for several thousand incidents of Latin American civil unrest, often many days in advance, by surfacing informative public posts available on Twitter and Tumblr.

    Authors: Ryan Compton, Craig Lee, Jiejun Xu, Luis Artieda-Moncada, Tsai-Ching Lu, Lalindra De Silva and Michael Macy
    Citation: Security Informatics 2014 3:4
  14. One of the key factors influencing how people react to and behave during a crisis is their digital or non-digital social network, and the information they receive through this network. Publicly available onlin...

    Authors: Joel Brynielsson, Fredrik Johansson, Carl Jonsson and Anders Westling
    Citation: Security Informatics 2014 3:7
  15. This study is a successful proof of concept of using automated text analysis to accurately classify transcribed 911 homicide calls according to their veracity. Fifty matched, caller-side transcripts were label...

    Authors: Mary B Burns and Kevin C Moffitt
    Citation: Security Informatics 2014 3:8
  16. Insurgency emerges from many interactions between numerous social, economical, and geographical factors. Adequately accounting for the large number of potentially relevant interactions, and the complex ways in...

    Authors: Philippe J Giabbanelli
    Citation: Security Informatics 2014 3:2
  17. Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kinds of terrorists before they commit a terror act is limited since they are hard to detect using tra...

    Authors: Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian MĂĄrtenson and Pontus Svenson
    Citation: Security Informatics 2013 2:11
  18. Computational criminology has been seen primarily as computer-intensive simulations of criminal wrongdoing. But there is a growing menu of computer-intensive applications in criminology that one might call “co...

    Authors: Richard Berk
    Citation: Security Informatics 2013 2:5
  19. Despite their importance for stakeholders in the criminal justice system, few methods have been developed for determining which criminal behavior variables will produce accurate sentence predictions. Some appr...

    Authors: Carlo Morselli, Victor Hugo Masias, Fernando Crespo and Sigifredo Laengle
    Citation: Security Informatics 2013 2:4
  20. The objectives of this research are to display the utility of using agent based model and simulated experiments in understanding criminal behavior. In particular, this research focuses upon the distance decay ...

    Authors: Arvind Verma, Ramyaa Ramyaa and Suresh Marru
    Citation: Security Informatics 2013 2:3
  21. Computational criminology seeks to address criminological and criminal justice problems through the use of applied mathematics, computer science, and criminology. The development of mathematical and computatio...

    Authors: Colby L Valentine, Carter Hay, Kevin M Beaver and Thomas G Blomberg
    Citation: Security Informatics 2013 2:2
  22. Dynamic activity involving social networks often has distinctive temporal patterns that can be exploited in situations involving incomplete information. Gang rivalry networks, in particular, display a high deg...

    Authors: Rachel A Hegemann, Erik A Lewis and Andrea L Bertozzi
    Citation: Security Informatics 2013 2:1
  23. Public safety has been a great concern in recent years as terrorism occurs everywhere. When a public event is held in an urban environment like Olympic games or soccer games, it is important to keep the public...

    Authors: Andrew J Park, Herbert H Tsang, Mengting Sun and Uwe Glässer
    Citation: Security Informatics 2012 1:23
  24. There is considerable interest in developing predictive capabilities for social diffusion processes, for instance to permit early identification of emerging contentious situations, rapid detection of disease o...

    Authors: Richard Colbaugh and Kristin Glass
    Citation: Security Informatics 2012 1:18
  25. The collection and assessment of national security related information often involves an arduous process of detecting relevant associations between people, events, and locations—typically within very large dat...

    Authors: Craig M Vineyard, Stephen J Verzi, Michael L Bernard, Shawn E Taylor, Irene Dubicka and Thomas P Caudell
    Citation: Security Informatics 2012 1:20