Skip to main content

Diagnosis Model for Detection of e-threats Against Soft-Targets

  • Conference paper
  • First Online:
Information Systems and Technologies (WorldCIST 2023)

Abstract

Threats online - internet, social media platforms, blogs - has risen with development of cybernetics tools of communication. Since the threats against soft targets are recurrent on cyberspace, the focus becomes an e-threat. This paper aims to contribute to construct a roadmap to apprehend e-threats against soft targets, considering the triangle ground of coexistence – normative, empirical and theoretical. An all-inclusive guide amalgamates the concepts of e-threats detections, risk, IA, soft targets, is developed to understand processes. The awareness of the added-value and the limitations of the integration of this technology in policing, is an initiative whose enforcement is legitimized and stranded in a simple concept of security. Despite the IA advances, and its efficiency for detection, the process is complex, because deceptive behaviour has a multidimensional nature. Our analysis reveals that the disruptive potential of e-threats of soft targets is tackled and some orientations are given to guarantee the safety and security of crowds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Laschi, M., Lombroso, C.: Le délit politique. Actes du Premier Congrès International d’Anthropologie Criminelle, Rome 1885, pp. 379–389, Bocca Fréres, Turin (1886)

    Google Scholar 

  2. Calhoun, T., Weston, S.: Contemporary threat management. San Diego: Specialized Training Services (2003)

    Google Scholar 

  3. Dietz, P.E., Martell, D.: Mentally disordered offenders in pursuit of celebrities and politicians. National Institute of Justice, Washington, DC (1989)

    Google Scholar 

  4. Fein, R., Vossekuil, B.: Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers. J. Forensic Sci. 44, 321–333 (1999)

    Article  Google Scholar 

  5. Fein, R., Vossekuil, B., Holden, G.: Threat assessment: An approach to prevent targeted violence (NCJ 155000). Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice (1995)

    Google Scholar 

  6. Dietz, P.E., Martell, D.: Commentary: approaching and stalking public figures—a prerequisite to attack. J. Am. Acad. Psychiatry Law 38, 341–348 (2010)

    Google Scholar 

  7. Meloy, J.R., Hoffmann, J., Guldimann, A., James, D.: The role of warning behaviors in threat assessment: an exploration and suggested typology. Behav. Sci. Law 30, 256–279 (2012). https://doi.org/10.1002/bsl.999

    Article  Google Scholar 

  8. Morgado, S.M.A., Felgueiras, S.: E-threats detection against public spaces and events. In: Yang, X.S., Sherratt, S., Dey, N., Joshi, A. (eds.) Proceedings of Eighth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems (Forthcoming). Springer, Singapore (2023)

    Google Scholar 

  9. Martins, M.: Ciberespaço: uma Nova Realidade para a Segurança Internacional 5(133), 32–49 (2012). https://www.idn.gov.pt/pt/publicacoes/nacao/Documents/NeD133/NeD133.pdf

  10. World Economic Forum: The Global Risks Report 2022: 17h Edition (2022). https://wef.ch/risks22

  11. Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021. Luxembourg: Publications Office of the European Union (2021). https://doi.org/10.2813/113799

  12. European Comission: COM/2017/041 final. Fourth progress report towards an effective and genuine Security Union. Luxembourg, Publications Office of the EU (2017)

    Google Scholar 

  13. Zeman, T.: Soft targets: definition and identification. Acad. Appl. Res. Mil. Publ. Manag. Sci. 19(1), 109–119 (2020). https://doi.org/10.32565/aarms.2020.1.10

  14. Kalvach, Z.: Basics of soft targets protection–guidelines. Soft Targets Protection Institute, Prague (2016)

    Google Scholar 

  15. Beňová, P., Hošková-Mayerová, Š, Navrátil, J.: Terrorist attacks on selected soft targets. J. Secur. Sustain. Issues 8(3), 453–471 (2019)

    Google Scholar 

  16. Schmid, A.: Layers of preventive measures for soft target protection against terrorist attacks. In A. Schmid (ed.), Handbook of terrorism prevention and preparedness. The Hague, NL: ICCT Press (2020). https://doi.org/10.19165/2020.6.01

  17. Europol: EU Terrorism situation & Trend report (TE-SAT) (2022). https://www.europol.europa.eu/publications-events/main-reports/tesat-report

  18. United Nations: A more secure world: Our shared responsibility. Report of the High-level Panel on Threats, Challenges and Change (2004). http://providus.lv/article_files/931/original/HLP_report_en.pdf?1326375616

  19. Creppell, I.: The concept of normative threat. Int. Theor. 3(3), 450–487 (2011). https://doi.org/10.1017/S1752971911000170

  20. Urinov, B.N.: Theoretical aspects of organizational behavior and corporate culture. Econ. Innovative Technol. 2020(2), 1–8 (2020)

    Google Scholar 

  21. Granjo, P.: Quando o conceito de «risco» se torna perigoso. Análise Social XL I(181), 1167–1179 (2006)

    Google Scholar 

  22. Nunes, P.: Mundos virtuais, riscos reais: fundamentos para a definição de uma Estratégia da Informação Nacional. Revista Militar (2506), 1169–1198 (2010). https://www.revistamilitar.pt/artigo/608

  23. Beck, U.: Risk society towards a new modernity, 2nd edn. Sage Publications, Newbury Park (1992)

    Google Scholar 

  24. Eachus, P., Stedmon, A., Baillie, L.: Hostile intent in public crowded spaces: a field study. Appl. Ergonomic 44, 703–709 (2013). https://doi.org/10.1016/j.apergo.2012.05.009

    Article  Google Scholar 

  25. Castells, M.: The rise of the network society, 2nd edn. Blackwell Publishing Ltd, New Jersey (2009)

    Book  Google Scholar 

  26. Alotaibi, A., Hasanat, M.H.A.: Racism detection in Twitter using deep learning and text mining techniques for the Arabic language. In: 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), pp. 161–164. IEEE, Riyadh (2020)

    Google Scholar 

  27. Khan H., Yu F., Sinha A., Gokhale S.: A Parsimonious and Practical Approach to Detecting Offensive Speech. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 688–695. IEEE, Greater Noida (2021). https://doi.org/10.1109/ICCCIS51004.2021.9397140

  28. Mussiraliyeva, S., Bolatbek, M., Omarov, B., Medetbek, Z., Baispay, G., Ospanov, R.: On detecting online radicalization and extremism using natural language processing. In: 21st International Arab Conference on Information Technology (ACIT). IEEE, Giza (2020). https://doi.org/10.1109/ACIT50332.2020.9300086

  29. Aziz, N., Maarof M., Zainal, A.: Hate speech and offensive language detection: a new feature set with filter-embedded combining feature selection. In: The 3rd International Cyber Resilience Conference (CRC) IEEE, Ghent (2021). https://doi.org/10.1109/CRC50527.2021.9392486

  30. Bujlow, T., Español C.V., Pareta S.J., Ros B.P.: Web Tracking: Mechanisms, Implications, and Defenses. ARXIV.ORG Digital Library (2015). https://www.researchgate.net/publication/280590332_Web_Tracking_Mechanisms_Implications_and_Defenses

  31. Weert, A., Eijkman, Q.: Early detection of extremism? The local security professional on assessment of potential threats pose by youth. Crime Law Soc. Chang. 73, 491–507 (2019). https://doi.org/10.1007/s10611-019-09877-y

    Article  Google Scholar 

  32. Morgado, S.M.A., Ferraz, R.: Análise de conteúdo e pesquisa em ciências policiais: Contextualização em ambiente virtual, facebook, e o planeamento de grandes eventos. In Costa, A. P., Tuzzo, S., Ruano, L., Silva, C. T., Souza, F. N, Souza, D. N. (eds.) CIAQ2016 – Investigação Qualitativa em Ciências Sociais, vol 3, pp. 600–608, CIAQ, Lisboa (2016a)

    Google Scholar 

  33. Morgado, S.M.A., R. Ferraz, R.: Social media: facebook e a gestão policial no planeamento de grandes eventos. International Journal of Marketing Communication and New Media (Special Number 1—QRMCNM), 27–47 (2016b)

    Google Scholar 

  34. Morgado, S: Going Global: Health organizations and networking – information society and social media. In: Proceedings in Scientific Conference 2013, pp 47–51. Thomson, Slovakia (2013)

    Google Scholar 

  35. Morgado, S., Alfaro, R.: Technology embracement in objective driven police: UAV’s in public security police in Portugal. In N. S. Teixeira, N. S., Oliveira, C. S. Lopes, M., Sardinha, B., Santos, A., Macedo, M. (eds.), International Conference on Risks, Security and Citizens: Proceedings/Atas, pp. 298–305. Setúbal: Município de Setúbal (2017)

    Google Scholar 

  36. Mendes, S., Morgado, S.: Intelligence services intervention: Constraints in portuguese democratic state. In: N. S. Teixeira, N. S., Oliveira, C. S. Lopes, M., Sardinha, B., Santos, A., Macedo, M. (eds.), International Conference on Risks, Security and Citizens: Proceedings/Atas, pp. 285–297. Setúbal: Município de Setúbal (2017)

    Google Scholar 

  37. Campbell, T.A.: Artificial intelligence: an overview of state initiatives. Future Grasp, LLC, Evergreen (2019)

    Google Scholar 

  38. Risi, F.T., Pera, A.: Artificial Intelligence in the field of criminal law. Special collection: Artificial Intelligence, pp. 6–17. UNICRI, Torino (2020)

    Google Scholar 

  39. Morgado, S.M.A., Felgueiras, S.: Technological Policing: Big Data versus Real Data. Politeia – Revista Portuguesa de Ciências Policiais XIX, 139–151 (2022). https://doi.org/10.57776/hkcb-br21

  40. Bernal, P.: Data gathering, surveillance and human rights: recasting the debate. J. Cyber Policy 1(2), 243–264 (2016). https://doi.org/10.1080/23738871.2016.1228990

    Article  Google Scholar 

  41. Bridges, L.E.: Digital failure: Unbecoming the “good” data subject through entropic, fugitive, and queer data. Big Data Soc. 8(1), 2053951720977882 (2021). https://doi.org/10.1177/2053951720977882

    Article  Google Scholar 

  42. Sanders, C.B., Sheptycki, J.: Policing, crime and ‘big data’; towards a critique of the moral economy of stochastic governance. Crime Law Soc. Chang. 68(1), 1–15 (2017). https://doi.org/10.1007/s10611-016-9678-7

    Article  Google Scholar 

  43. UNICRI: Strategic programme framework. UNICRI, Torino (2020)

    Google Scholar 

  44. Risse, M.: Human rights and artificial intelligence: an urgently needed agenda. Hum. Rights Q. 41(1), 1–16 (2019). https://doi.org/10.1353/hrq.2019.0000

  45. Council of Europe: CETS 005 - Convention for the Protection of Human Rights and Fundamental Freedoms (coe.int) (2019). https://rm.coe.int/1680a2353d

  46. Wakefield, A.: The public surveillance functions of private security. Surveill. Soc. 2(4) (2002). https://doi.org/10.24908/ss.v2i4.3362

  47. Benson, B.L.: Crime control through private enterprise. Independent Rev. 2(3), 341–371 (1998). http://www.jstor.org/stable/24561016

  48. European Parliament, Council of the European Union: EU Directive 95/46/EC - on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:31995L0046

  49. Custers, B., Uršič, H.: Big data and data reuse: a taxonomy of data reuse for balancing big data benefits and personal data protection. Int. Data Privacy Law 6(1), 4–15 (2016). https://doi.org/10.1093/idpl/ipv028

    Article  Google Scholar 

  50. Risse, M.: Human rights and artificial intelligence: an urgently needed agenda. Hum. Rights Q. 41(1), 1–16 (2019). https://doi.org/10.1353/hrq.2019.0000

    Article  Google Scholar 

  51. Council of Europe: Council Framework Decision 2008/977/JHA - On the protection of personal data processed in the framework of police and judicial cooperation in criminal matters (2008). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32008F0977

  52. European Commission. Directorate-General for Communications Networks, Content and Technology: Ethics guidelines for trustworthy AI, Publications Office (2019a). https://doi.org/10.2759/346720

  53. European Commission. Directorate-General for Communications Networks, Content and Technology: Assessment List for Trustworthy Artificial Intelligence (ALTAI) for self-assessment. Publications Office (2020). https://digital-strategy.ec.europa.eu/en/library/assessment-list-trustworthy-artificial-intelligence-altai-self-assessment

  54. European Commission: Ethics by design and ethics of use approaches for artificial intelligence (2021). https://ec.europa.eu/info/funding-tenders/opportunities/docs/2021-2027/horizon/guidance/ethics-by-design-and-ethics-of-use-approaches-for-artificial-intelligence_he_en.pdf

  55. Land, M.K., Aronson, J.D.: Human rights and technology: new challenges for justice and accountability. Ann. Rev. Law Soc. Sci. (Forthcoming) 16, 223–240 (2020)

    Google Scholar 

  56. Lei, Y., Yang, B., Jiang, X., Jia, F., Li, N., Nandi, A.K.: Applications of machine learning to machine fault diagnosis: a review and roadmap. Mech. Syst. Signal Process. 138, 106587 (2020). https://doi.org/10.1016/j.ymssp.2019.106587

    Article  Google Scholar 

  57. Pfisterer, F., van Rijn, J.N., Probst, P., Müller, A.C., Bischl, B.: Learning multiple defaults for machine learning algorithms. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 241–242. GECO, Kyoto (2021)

    Google Scholar 

  58. Morgado, S.M.A., Felgueiras, S.: Big Data in Policing: Profiling, patterns, and out of the box thinking. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Ramalho Correia, A.M. (eds.) WorldCIST 2021. AISC, vol. 1365, pp. 217–226. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-72657-7_21

    Chapter  Google Scholar 

  59. Khanzode, K.C.A., Sarode, R.D.: Advantages and disadvantages of artificial intelligence and machine learning: a literature review. Int. J. Libr. Inf. Sci. (IJLIS) 9(1), 30–36 (2020)

    Google Scholar 

  60. Ray, S.: A quick review of machine learning algorithms. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 35–39. IEEE, India (2019). https://doi.org/10.1109/COMITCon.2019.8862451

  61. Boin, A., Comfort, L.K., Demchak, C.C.: The rise of resilience. Designing Resilience Preparing Extreme Events 1, 1–12 (2010)

    Google Scholar 

  62. Pais, L.G., Felgueiras, S., Rodrigues, A., Santos, J., Varela, T.: Protesto político e atividade policial: a perceção dos” media”. Análise Social 216(3º), 494–517 (2015)

    Google Scholar 

  63. Beridze, I.: Foreword. Special collection: Artificial Intelligence. UNICRI, Torino (2020)

    Google Scholar 

  64. Felgueiras, S., Pais, L.G., Morgado, S.M.A.: Interoperability: Diagnosing a novel assess model. European Law Enforcement Research Bulletin, Special Conference Edition: Innovations in law enforcement: Implications for practice. Educ. Civ. Soc. (4), 255–260 (2018). https://bulletin.cepol.europa.eu/index.php/bulletin/article/view/339/301

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sónia M. A. Morgado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Morgado, S.M.A., Carvalho, M., Felgueiras, S. (2024). Diagnosis Model for Detection of e-threats Against Soft-Targets. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F., Colla, V. (eds) Information Systems and Technologies. WorldCIST 2023. Lecture Notes in Networks and Systems, vol 800. Springer, Cham. https://doi.org/10.1007/978-3-031-45645-9_24

Download citation

Publish with us

Policies and ethics