Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
SECURITY TECHNOLOGIES AND SOCIAL IMPLICATIONS Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime and terrorismSecurity Technologies and Social Implications focuses on the development and application of new technologies that police and homeland security officers can leverage as a tool for both predictive and intelligence-led investigations. The book recommends the best practices for incorporation of these technologies into day-to-day activities by law enforcement agencies and counter-terrorism units. Practically, it addresses legal, technological, and organizational challenges (e.g. resource limitation and privacy concerns) combined with challenges related to the adoption of innovative technologies.In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, machine learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime (and cybercrime in particular) becomes more and more sophisticated, security requires a complex mix of social measures, including prevention, detection, investigation, and prosecution. Key topics related to these developments and their implementations covered in Security Technologies and Social Implications include: New security technologies and how these technologies can be implemented in practice, plus associated social, ethical or policy issuesExpertise and commentary from individuals developing and testing new technologies and individuals using the technologies within their everyday rolesThe latest advancements in commercial and professional law enforcement technologies and platformsCommentary on how technologies can advance humanity by making policing and security more efficient and keeping citizens safeSecurity Technologies and Social Implications serves as a comprehensive resource for defense personnel and law enforcement staff, practical security engineers, and trainee staff in security and police colleges to understand the latest security technologies, with a critical look at their uses and limitations regarding potential ethical, regulatory, or legal issues.
Garik Markarian is an Emeritus Professor of Lancaster University and CEO of Rinicom Ltd (UK).Ruza Karlovic is Vice Dean for Research at the Police College in Zagreb, Croatia.Holger Nitsch is Head of the Research and Social Science Department at the College of the Bavarian Police, GermanyKrishna Chandramouli is Chief Technology Officer at Venaka Media Limited and Subject Matter Expert of AI at CBRNE Ltd.
List of Contributors xiiPreface xvIntroduction xvii1 The Circle of Change: Technology Impact on LEAs 1Ines Sucic1.1 Introduction 11.2 Study Aims and Objectives 31.3 Methodology 31.4 Results 41.5 Discussion 171.6 Instead of Conclusion 192 Data Protection Impact Assessments in Law Enforcement: Identifying and Mitigating Risks in Algorithmic Policing 32Thomas Marquenie and Katherine Quezada-Tavárez2.1 Introduction 322.2 Legal Framework and Guidance 332.3 Importance and Role of DPIAs in Law Enforcement 382.4 Key Legal and Ethical Risks in Algorithmic Policing 412.5 Best Practices: Mitigation Measures and Safeguards 462.6 Conclusion 533 Methods of Stakeholder Engagement for the Co-Design of Security Technologies 61Andrea Iannone, Luigi Briguglio, Carmela Occhipinti, and Valeria Cesaroni3.1 Toward a Holistic Approach for Technology Assessment 613.2 Methods of Stakeholder Engagement 653.3 Conclusions 783.4 Recommendations 794 Performance Assessment of Soft Biometrics Technologies for Border Crossing 82Bilal Hassan, Ebroul Izquierdo, and Krishna Chandramouli4.1 Introduction 824.2 Literature Review 854.3 Human Body Anthropometrics 894.4 Working on Dataset for Soft Biometrics 944.5 Some Influential Factors for Soft Biometrics 974.6 Working with Limited Data Using Transfer Learning 994.7 Experimental Result 1034.8 Discussion 1114.9 Conclusion 1145 Counter-Unmanned Aerial Vehicle Systems: Technical, Training, and Regulatory Challenges 122David Fortune, Holger Nitsch, Garik Markarian, Damir Ostermanm, and Andrew Staniforth5.1 Introduction 1225.2 Drone Terror Threat Landscape 1235.3 UAV Configurations and Categories of UAVs 1275.4 Counter- Drone Technology 1305.5 Programming Rogue Drone Countermeasures 1355.6 Training End Users of C-UAV Systems 1385.7 Conclusions 1466 Critical Infrastructure Security Using Computer Vision Technologies 149Xindi Zhang, Ebroul Izquierdo, and Krishna Chandramouli6.1 Introduction 1496.2 Literature Review 1526.3 Critical Infrastructure Security Using Computer Vision Technologies 1546.4 Intelligent Situational Awareness Framework for Intruder Detection 1656.5 Experimental Result 1706.6 Distance Estimation 1756.7 Conclusion 1777 Evaluation of Content Fusion Algorithms for Large and Heterogeneous Datasets 181Theodoros Alexakis, Nikolaos Peppes, Evgenia Adamopoulou, Konstantinos Demestichas, and Konstantina Remoundou7.1 Introduction 1817.2 Data Preprocessing and Similarity Calculation Techniques 1827.3 Description of the Algorithms Used 1847.4 Proposed Methodology and Data Used 1877.5 Results 1897.6 Person Fusion Toolset Design for Future Development 1927.7 Discussion 1948 Stakeholder Engagement Model to Facilitate the Uptake by End Users of Crisis Communication Systems 198Grigore M. Havârneanu, Laura Petersen, and Natasha McCrone8.1 Introduction 1988.2 Risk and Crisis Communication Challenges for CBRNe 2008.3 CBRNe Disaster Crisis Communication Systems, Especially Disaster Apps 2028.4 The PROACTIVE Stakeholder Engagement Model 2038.5 Lessons Learnt About the Stakeholder Engagement Model 2168.6 Going Forward: Ensuring the Crisis Communication System's Market Uptake 2189 Crime Mapping in Crime Analysis: The Developments in the Past Two Decades 222Gorazd Meško, Katja Eman, and Rok Hacin9.1 Introduction 2229.2 Introducing Crime Mapping to the Slovenian Police 2269.3 Crime Mapping Studies 2289.4 Geographic Information Systems Laboratory – "GIS Lab" – at the Faculty of Criminal Justice and Security, University of Maribor and Cooperation with the Slovenian Police 2359.5 First Steps and Inclusion of Crime Analysis to Research and Teaching at the Faculty of Criminal Justice and Security , University of Maribor 2379.6 Discussion and Conclusion 23910 The Threat of Behavioral Radicalization Online: Conceptual Challenges and Technical Solutions Provided by the PROPHETS (Preventing Radicalization Online through the Proliferation of Harmonized ToolkitS) Project 247Ruza Karlovic, Holger Nitsch, Sven- Eric Fikenscher, Damir Osterman, Sotirios Menexis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris, and Arif Sahar10.1 The Growing Threat of Online Radicalization 24710.2 The Implications of Online Radicalization 24910.3 Delineating Essential Radicalization- Related Online Activities 25110.4 The Root Causes of Behavioral Radicalization Online: Identifying the Proper Vulnerability Indicators 25210.5 PROPHETS Tools: Preventing, Detecting, Investigating, and Studying Behavioral Radicalization Online 25410.6 Monitoring and Situational Awareness Toolkit 25510.7 Policymaking Toolkit 25610.8 Expert Notification Portal 25710.9 Conclusion: Combining Social Science and Technological Insights 25811 Blockchain Technologies for Chain of Custody Authentication 262Krishna Chandramouli, Roxana Horincar, Charlotte Jacobe de Naurois, Dirk Pallmer, David Faure, Wilmuth Müller, and Konstantinos Demestichas11.1 Introduction 26211.2 MAGNETO Architecture 26611.3 Literature Review 26611.4 Semantic Framework for Recording Evidence Transactions 26911.5 Evidence Lifecycle Management 27511.6 IPFS Storage 27611.7 Accessibility and Evidence Traceability 27911.8 MAGNETO Features Against Cognitive Biases 28211.9 Conclusions 28712 Chances and Challenges of Predictive Policing for Law Enforcement Agencies 290Sebastian Allertseder, Guenter Okon, and Thomas Schweer12.1 Next Generation Policing by Prediction of Crime 29112.2 Lessons Learned from Previous Mistakes 29112.3 A Question of Methodology 29412.4 Intuitive Method 29412.5 Statistical-Nomothetical Prognosis 29512.6 Clinical-Idiographic Prognosis 29612.7 Methodology of Criminal Forecasting 29612.8 Rational Choice Theory 29812.9 Learning Theories 29812.10 Routine Activity Approach 29912.11 The Ecological Approach 30012.12 The Technological Dimension and Data-Protection Challenges 30212.13 Predictive Policing in the Field of Radicalization and Terrorism 30412.14 Personal Risk Assessment in Context of Radicalization – Findings from the PREVISION Project 30512.15 Personal Risk Assessment 30512.16 Text Analysis 30712.17 Identification of Problematic Content 30712.18 Methodological Design 308References 310Index 314
Carlos E. Palau, Giancarlo Fortino, Miguel Montesinos, George Exarchakos, Pablo Giménez, Garik Markarian, Valérie Castay, Flavio Fuart, Wiesław Pawłowski, Marina Mortara, Alessandro Bassi, Frans Gevers, Gema Ibáñez-Sánchez, Ignacio Huet, Pablo Gimenez, Valerie Castay, Wieslaw Pawlowski
Carlos E. Palau, Giancarlo Fortino, Miguel Montesinos, George Exarchakos, Pablo Giménez, Garik Markarian, Valérie Castay, Flavio Fuart, Wiesław Pawłowski, Marina Mortara, Alessandro Bassi, Frans Gevers, Gema Ibáñez-Sánchez, Ignacio Huet, Pablo Gimenez, Valerie Castay, Wieslaw Pawlowski
Carlos E. Palau, Giancarlo Fortino, Miguel Montesinos, George Exarchakos, Pablo Giménez, Garik Markarian, Valérie Castay, Flavio Fuart, Wiesław Pawłowski, Marina Mortara, Alessandro Bassi, Frans Gevers, Gema Ibáñez-Sánchez, Ignacio Huet, Pablo Gimenez, Valerie Castay, Wieslaw Pawlowski
Carlos E. Palau, Giancarlo Fortino, Miguel Montesinos, George Exarchakos, Pablo Giménez, Garik Markarian, Valérie Castay, Flavio Fuart, Wiesław Pawłowski, Marina Mortara, Alessandro Bassi, Frans Gevers, Gema Ibáñez-Sánchez, Ignacio Huet, Pablo Gimenez, Valerie Castay, Wieslaw Pawlowski