Markarian / Karlovic / Nitsch | Security Technologies and Social Implications | Buch | 978-1-119-83414-4 | www.sack.de

Buch, Englisch, 352 Seiten, Format (B × H): 157 mm x 235 mm, Gewicht: 657 g

Markarian / Karlovic / Nitsch

Security Technologies and Social Implications


1. Auflage 2022
ISBN: 978-1-119-83414-4
Verlag: Wiley

Buch, Englisch, 352 Seiten, Format (B × H): 157 mm x 235 mm, Gewicht: 657 g

ISBN: 978-1-119-83414-4
Verlag: Wiley


SECURITY TECHNOLOGIES AND SOCIAL IMPLICATIONS

Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime and terrorism

Security Technologies and Social Implications focuses on the development and application of new technologies that police and homeland security officers can leverage as a tool for both predictive and intelligence-led investigations. The book recommends the best practices for incorporation of these technologies into day-to-day activities by law enforcement agencies and counter-terrorism units. Practically, it addresses legal, technological, and organizational challenges (e.g. resource limitation and privacy concerns) combined with challenges related to the adoption of innovative technologies.

In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, machine learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime (and cybercrime in particular) becomes more and more sophisticated, security requires a complex mix of social measures, including prevention, detection, investigation, and prosecution. Key topics related to these developments and their implementations covered in Security Technologies and Social Implications include:

- New security technologies and how these technologies can be implemented in practice, plus associated social, ethical or policy issues
- Expertise and commentary from individuals developing and testing new technologies and individuals using the technologies within their everyday roles
- The latest advancements in commercial and professional law enforcement technologies and platforms
- Commentary on how technologies can advance humanity by making policing and security more efficient and keeping citizens safe

Security Technologies and Social Implications serves as a comprehensive resource for defense personnel and law enforcement staff, practical security engineers, and trainee staff in security and police colleges to understand the latest security technologies, with a critical look at their uses and limitations regarding potential ethical, regulatory, or legal issues.

Markarian / Karlovic / Nitsch Security Technologies and Social Implications jetzt bestellen!

Weitere Infos & Material


List of Contributors xii
Preface xv
Introduction xvii

1 The Circle of Change: Technology Impact on LEAs 1
Ines Sucic

1.1 Introduction 1
1.2 Study Aims and Objectives 3
1.3 Methodology 3
1.4 Results 4
1.5 Discussion 17
1.6 Instead of Conclusion 19

2 Data Protection Impact Assessments in Law Enforcement: Identifying and Mitigating Risks in Algorithmic Policing 32
Thomas Marquenie and Katherine Quezada-Tavárez

2.1 Introduction 32
2.2 Legal Framework and Guidance 33
2.3 Importance and Role of DPIAs in Law Enforcement 38
2.4 Key Legal and Ethical Risks in Algorithmic Policing 41
2.5 Best Practices: Mitigation Measures and Safeguards 46
2.6 Conclusion 53

3 Methods of Stakeholder Engagement for the Co-Design of Security Technologies 61
Andrea Iannone, Luigi Briguglio, Carmela Occhipinti, and Valeria Cesaroni

3.1 Toward a Holistic Approach for Technology Assessment 61
3.2 Methods of Stakeholder Engagement 65
3.3 Conclusions 78
3.4 Recommendations 79

4 Performance Assessment of Soft Biometrics Technologies for Border Crossing 82
Bilal Hassan, Ebroul Izquierdo, and Krishna Chandramouli

4.1 Introduction 82
4.2 Literature Review 85
4.3 Human Body Anthropometrics 89
4.4 Working on Dataset for Soft Biometrics 94
4.5 Some Influential Factors for Soft Biometrics 97
4.6 Working with Limited Data Using Transfer Learning 99
4.7 Experimental Result 103
4.8 Discussion 111
4.9 Conclusion 114

5 Counter-Unmanned Aerial Vehicle Systems: Technical, Training, and Regulatory Challenges 122
David Fortune, Holger Nitsch, Garik Markarian, Damir Ostermanm, and Andrew Staniforth

5.1 Introduction 122
5.2 Drone Terror Threat Landscape 123
5.3 UAV Configurations and Categories of UAVs 127
5.4 Counter- Drone Technology 130
5.5 Programming Rogue Drone Countermeasures 135
5.6 Training End Users of C-UAV Systems 138
5.7 Conclusions 146

6 Critical Infrastructure Security Using Computer Vision Technologies 149
Xindi Zhang, Ebroul Izquierdo, and Krishna Chandramouli

6.1 Introduction 149
6.2 Literature Review 152
6.3 Critical Infrastructure Security Using Computer Vision Technologies 154
6.4 Intelligent Situational Awareness Framework for Intruder Detection 165
6.5 Experimental Result 170
6.6 Distance Estimation 175
6.7 Conclusion 177

7 Evaluation of Content Fusion Algorithms for Large and Heterogeneous Datasets 181
Theodoros Alexakis, Nikolaos Peppes, Evgenia Adamopoulou, Konstantinos Demestichas, and Konstantina Remoundou

7.1 Introduction 181
7.2 Data Preprocessing and Similarity Calculation Techniques 182
7.3 Description of the Algorithms Used 184
7.4 Proposed Methodology and Data Used 187
7.5 Results 189
7.6 Person Fusion Toolset Design for Future Development 192
7.7 Discussion 194

8 Stakeholder Engagement Model to Facilitate the Uptake by End Users of Crisis Communication Systems 198
Grigore M. Havârneanu, Laura Petersen, and Natasha McCrone

8.1 Introduction 198
8.2 Risk and Crisis Communication Challenges for CBRNe 200
8.3 CBRNe Disaster Crisis Communication Systems, Especially Disaster Apps 202
8.4 The PROACTIVE Stakeholder Engagement Model 203
8.5 Lessons Learnt About the Stakeholder Engagement Model 216
8.6 Going Forward: Ensuring the Crisis Communication System's Market Uptake 218

9 Crime Mapping in Crime Analysis: The Developments in the Past Two Decades 222
Gorazd Meško, Katja Eman, and Rok Hacin

9.1 Introduction 222
9.2 Introducing Crime Mapping to the Slovenian Police 226
9.3 Crime Mapping Studies 228
9.4 Geographic Information Systems Laboratory – "GIS Lab" – at the Faculty of Criminal Justice and Security, University of Maribor and Cooperation with the Slovenian Police 235
9.5 First Steps and Inclusion of Crime Analysis to Research and Teaching at the Faculty of Criminal Justice and Security, University of Maribor 237
9.6 Discussion and Conclusion 239

10 The Threat of Behavioral Radicalization Online: Conceptual Challenges and Technical Solutions Provided by the PROPHETS (Preventing Radicalization Online through the Proliferation of Harmonized ToolkitS) Project 247
Ruza Karlovic, Holger Nitsch, Sven- Eric Fikenscher, Damir Osterman, Sotirios Menexis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris, and Arif Sahar

10.1 The Growing Threat of Online Radicalization 247
10.2 The Implications of Online Radicalization 249
10.3 Delineating Essential Radicalization- Related Online Activities 251
10.4 The Root Causes of Behavioral Radicalization Online: Identifying the Proper Vulnerability Indicators 252
10.5 PROPHETS Tools: Preventing, Detecting, Investigating, and Studying Behavioral Radicalization Online 254
10.6 Monitoring and Situational Awareness Toolkit 255
10.7 Policymaking Toolkit 256
10.8 Expert Notification Portal 257
10.9 Conclusion: Combining Social Science and Technological Insights 258

11 Blockchain Technologies for Chain of Custody Authentication 262
Krishna Chandramouli, Roxana Horincar, Charlotte Jacobe de Naurois, Dirk Pallmer, David Faure, Wilmuth Müller, and Konstantinos Demestichas

11.1 Introduction 262
11.2 MAGNETO Architecture 266
11.3 Literature Review 266
11.4 Semantic Framework for Recording Evidence Transactions 269
11.5 Evidence Lifecycle Management 275
11.6 IPFS Storage 276
11.7 Accessibility and Evidence Traceability 279
11.8 MAGNETO Features Against Cognitive Biases 282
11.9 Conclusions 287

12 Chances and Challenges of Predictive Policing for Law Enforcement Agencies 290
Sebastian Allertseder, Guenter Okon, and Thomas Schweer

12.1 Next Generation Policing by Prediction of Crime 291
12.2 Lessons Learned from Previous Mistakes 291
12.3 A Question of Methodology 294
12.4 Intuitive Method 294
12.5 Statistical-Nomothetical Prognosis 295
12.6 Clinical-Idiographic Prognosis 296
12.7 Methodology of Criminal Forecasting 296
12.8 Rational Choice Theory 298
12.9 Learning Theories 298
12.10 Routine Activity Approach 299
12.11 The Ecological Approach 300
12.12 The Technological Dimension and Data-Protection Challenges 302
12.13 Predictive Policing in the Field of Radicalization and Terrorism 304
12.14 Personal Risk Assessment in Context of Radicalization – Findings from the PREVISION Project 305
12.15 Personal Risk Assessment 305
12.16 Text Analysis 307
12.17 Identification of Problematic Content 307
12.18 Methodological Design 308

References 310
Index 314


Garik Markarian is an Emeritus Professor of Lancaster University and CEO of Rinicom Ltd (UK).

Ruza Karlovic is Vice Dean for Research at the Police College in Zagreb, Croatia.

Holger Nitsch is Head of the Research and Social Science Department at the College of the Bavarian Police, Germany

Krishna Chandramouli is Chief Technology Officer at Venaka Media Limited and Subject Matter Expert of AI at CBRNE Ltd.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.