Abstract
Threats online - internet, social media platforms, blogs - has risen with development of cybernetics tools of communication. Since the threats against soft targets are recurrent on cyberspace, the focus becomes an e-threat. This paper aims to contribute to construct a roadmap to apprehend e-threats against soft targets, considering the triangle ground of coexistence – normative, empirical and theoretical. An all-inclusive guide amalgamates the concepts of e-threats detections, risk, IA, soft targets, is developed to understand processes. The awareness of the added-value and the limitations of the integration of this technology in policing, is an initiative whose enforcement is legitimized and stranded in a simple concept of security. Despite the IA advances, and its efficiency for detection, the process is complex, because deceptive behaviour has a multidimensional nature. Our analysis reveals that the disruptive potential of e-threats of soft targets is tackled and some orientations are given to guarantee the safety and security of crowds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Laschi, M., Lombroso, C.: Le délit politique. Actes du Premier Congrès International d’Anthropologie Criminelle, Rome 1885, pp. 379–389, Bocca Fréres, Turin (1886)
Calhoun, T., Weston, S.: Contemporary threat management. San Diego: Specialized Training Services (2003)
Dietz, P.E., Martell, D.: Mentally disordered offenders in pursuit of celebrities and politicians. National Institute of Justice, Washington, DC (1989)
Fein, R., Vossekuil, B.: Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers. J. Forensic Sci. 44, 321–333 (1999)
Fein, R., Vossekuil, B., Holden, G.: Threat assessment: An approach to prevent targeted violence (NCJ 155000). Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice (1995)
Dietz, P.E., Martell, D.: Commentary: approaching and stalking public figures—a prerequisite to attack. J. Am. Acad. Psychiatry Law 38, 341–348 (2010)
Meloy, J.R., Hoffmann, J., Guldimann, A., James, D.: The role of warning behaviors in threat assessment: an exploration and suggested typology. Behav. Sci. Law 30, 256–279 (2012). https://doi.org/10.1002/bsl.999
Morgado, S.M.A., Felgueiras, S.: E-threats detection against public spaces and events. In: Yang, X.S., Sherratt, S., Dey, N., Joshi, A. (eds.) Proceedings of Eighth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems (Forthcoming). Springer, Singapore (2023)
Martins, M.: Ciberespaço: uma Nova Realidade para a Segurança Internacional 5(133), 32–49 (2012). https://www.idn.gov.pt/pt/publicacoes/nacao/Documents/NeD133/NeD133.pdf
World Economic Forum: The Global Risks Report 2022: 17h Edition (2022). https://wef.ch/risks22
Europol: Internet Organised Crime Threat Assessment (IOCTA) 2021. Luxembourg: Publications Office of the European Union (2021). https://doi.org/10.2813/113799
European Comission: COM/2017/041 final. Fourth progress report towards an effective and genuine Security Union. Luxembourg, Publications Office of the EU (2017)
Zeman, T.: Soft targets: definition and identification. Acad. Appl. Res. Mil. Publ. Manag. Sci. 19(1), 109–119 (2020). https://doi.org/10.32565/aarms.2020.1.10
Kalvach, Z.: Basics of soft targets protection–guidelines. Soft Targets Protection Institute, Prague (2016)
Beňová, P., Hošková-Mayerová, Š, Navrátil, J.: Terrorist attacks on selected soft targets. J. Secur. Sustain. Issues 8(3), 453–471 (2019)
Schmid, A.: Layers of preventive measures for soft target protection against terrorist attacks. In A. Schmid (ed.), Handbook of terrorism prevention and preparedness. The Hague, NL: ICCT Press (2020). https://doi.org/10.19165/2020.6.01
Europol: EU Terrorism situation & Trend report (TE-SAT) (2022). https://www.europol.europa.eu/publications-events/main-reports/tesat-report
United Nations: A more secure world: Our shared responsibility. Report of the High-level Panel on Threats, Challenges and Change (2004). http://providus.lv/article_files/931/original/HLP_report_en.pdf?1326375616
Creppell, I.: The concept of normative threat. Int. Theor. 3(3), 450–487 (2011). https://doi.org/10.1017/S1752971911000170
Urinov, B.N.: Theoretical aspects of organizational behavior and corporate culture. Econ. Innovative Technol. 2020(2), 1–8 (2020)
Granjo, P.: Quando o conceito de «risco» se torna perigoso. Análise Social XL I(181), 1167–1179 (2006)
Nunes, P.: Mundos virtuais, riscos reais: fundamentos para a definição de uma Estratégia da Informação Nacional. Revista Militar (2506), 1169–1198 (2010). https://www.revistamilitar.pt/artigo/608
Beck, U.: Risk society towards a new modernity, 2nd edn. Sage Publications, Newbury Park (1992)
Eachus, P., Stedmon, A., Baillie, L.: Hostile intent in public crowded spaces: a field study. Appl. Ergonomic 44, 703–709 (2013). https://doi.org/10.1016/j.apergo.2012.05.009
Castells, M.: The rise of the network society, 2nd edn. Blackwell Publishing Ltd, New Jersey (2009)
Alotaibi, A., Hasanat, M.H.A.: Racism detection in Twitter using deep learning and text mining techniques for the Arabic language. In: 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), pp. 161–164. IEEE, Riyadh (2020)
Khan H., Yu F., Sinha A., Gokhale S.: A Parsimonious and Practical Approach to Detecting Offensive Speech. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 688–695. IEEE, Greater Noida (2021). https://doi.org/10.1109/ICCCIS51004.2021.9397140
Mussiraliyeva, S., Bolatbek, M., Omarov, B., Medetbek, Z., Baispay, G., Ospanov, R.: On detecting online radicalization and extremism using natural language processing. In: 21st International Arab Conference on Information Technology (ACIT). IEEE, Giza (2020). https://doi.org/10.1109/ACIT50332.2020.9300086
Aziz, N., Maarof M., Zainal, A.: Hate speech and offensive language detection: a new feature set with filter-embedded combining feature selection. In: The 3rd International Cyber Resilience Conference (CRC) IEEE, Ghent (2021). https://doi.org/10.1109/CRC50527.2021.9392486
Bujlow, T., Español C.V., Pareta S.J., Ros B.P.: Web Tracking: Mechanisms, Implications, and Defenses. ARXIV.ORG Digital Library (2015). https://www.researchgate.net/publication/280590332_Web_Tracking_Mechanisms_Implications_and_Defenses
Weert, A., Eijkman, Q.: Early detection of extremism? The local security professional on assessment of potential threats pose by youth. Crime Law Soc. Chang. 73, 491–507 (2019). https://doi.org/10.1007/s10611-019-09877-y
Morgado, S.M.A., Ferraz, R.: Análise de conteúdo e pesquisa em ciências policiais: Contextualização em ambiente virtual, facebook, e o planeamento de grandes eventos. In Costa, A. P., Tuzzo, S., Ruano, L., Silva, C. T., Souza, F. N, Souza, D. N. (eds.) CIAQ2016 – Investigação Qualitativa em Ciências Sociais, vol 3, pp. 600–608, CIAQ, Lisboa (2016a)
Morgado, S.M.A., R. Ferraz, R.: Social media: facebook e a gestão policial no planeamento de grandes eventos. International Journal of Marketing Communication and New Media (Special Number 1—QRMCNM), 27–47 (2016b)
Morgado, S: Going Global: Health organizations and networking – information society and social media. In: Proceedings in Scientific Conference 2013, pp 47–51. Thomson, Slovakia (2013)
Morgado, S., Alfaro, R.: Technology embracement in objective driven police: UAV’s in public security police in Portugal. In N. S. Teixeira, N. S., Oliveira, C. S. Lopes, M., Sardinha, B., Santos, A., Macedo, M. (eds.), International Conference on Risks, Security and Citizens: Proceedings/Atas, pp. 298–305. Setúbal: Município de Setúbal (2017)
Mendes, S., Morgado, S.: Intelligence services intervention: Constraints in portuguese democratic state. In: N. S. Teixeira, N. S., Oliveira, C. S. Lopes, M., Sardinha, B., Santos, A., Macedo, M. (eds.), International Conference on Risks, Security and Citizens: Proceedings/Atas, pp. 285–297. Setúbal: Município de Setúbal (2017)
Campbell, T.A.: Artificial intelligence: an overview of state initiatives. Future Grasp, LLC, Evergreen (2019)
Risi, F.T., Pera, A.: Artificial Intelligence in the field of criminal law. Special collection: Artificial Intelligence, pp. 6–17. UNICRI, Torino (2020)
Morgado, S.M.A., Felgueiras, S.: Technological Policing: Big Data versus Real Data. Politeia – Revista Portuguesa de Ciências Policiais XIX, 139–151 (2022). https://doi.org/10.57776/hkcb-br21
Bernal, P.: Data gathering, surveillance and human rights: recasting the debate. J. Cyber Policy 1(2), 243–264 (2016). https://doi.org/10.1080/23738871.2016.1228990
Bridges, L.E.: Digital failure: Unbecoming the “good” data subject through entropic, fugitive, and queer data. Big Data Soc. 8(1), 2053951720977882 (2021). https://doi.org/10.1177/2053951720977882
Sanders, C.B., Sheptycki, J.: Policing, crime and ‘big data’; towards a critique of the moral economy of stochastic governance. Crime Law Soc. Chang. 68(1), 1–15 (2017). https://doi.org/10.1007/s10611-016-9678-7
UNICRI: Strategic programme framework. UNICRI, Torino (2020)
Risse, M.: Human rights and artificial intelligence: an urgently needed agenda. Hum. Rights Q. 41(1), 1–16 (2019). https://doi.org/10.1353/hrq.2019.0000
Council of Europe: CETS 005 - Convention for the Protection of Human Rights and Fundamental Freedoms (coe.int) (2019). https://rm.coe.int/1680a2353d
Wakefield, A.: The public surveillance functions of private security. Surveill. Soc. 2(4) (2002). https://doi.org/10.24908/ss.v2i4.3362
Benson, B.L.: Crime control through private enterprise. Independent Rev. 2(3), 341–371 (1998). http://www.jstor.org/stable/24561016
European Parliament, Council of the European Union: EU Directive 95/46/EC - on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:31995L0046
Custers, B., Uršič, H.: Big data and data reuse: a taxonomy of data reuse for balancing big data benefits and personal data protection. Int. Data Privacy Law 6(1), 4–15 (2016). https://doi.org/10.1093/idpl/ipv028
Risse, M.: Human rights and artificial intelligence: an urgently needed agenda. Hum. Rights Q. 41(1), 1–16 (2019). https://doi.org/10.1353/hrq.2019.0000
Council of Europe: Council Framework Decision 2008/977/JHA - On the protection of personal data processed in the framework of police and judicial cooperation in criminal matters (2008). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32008F0977
European Commission. Directorate-General for Communications Networks, Content and Technology: Ethics guidelines for trustworthy AI, Publications Office (2019a). https://doi.org/10.2759/346720
European Commission. Directorate-General for Communications Networks, Content and Technology: Assessment List for Trustworthy Artificial Intelligence (ALTAI) for self-assessment. Publications Office (2020). https://digital-strategy.ec.europa.eu/en/library/assessment-list-trustworthy-artificial-intelligence-altai-self-assessment
European Commission: Ethics by design and ethics of use approaches for artificial intelligence (2021). https://ec.europa.eu/info/funding-tenders/opportunities/docs/2021-2027/horizon/guidance/ethics-by-design-and-ethics-of-use-approaches-for-artificial-intelligence_he_en.pdf
Land, M.K., Aronson, J.D.: Human rights and technology: new challenges for justice and accountability. Ann. Rev. Law Soc. Sci. (Forthcoming) 16, 223–240 (2020)
Lei, Y., Yang, B., Jiang, X., Jia, F., Li, N., Nandi, A.K.: Applications of machine learning to machine fault diagnosis: a review and roadmap. Mech. Syst. Signal Process. 138, 106587 (2020). https://doi.org/10.1016/j.ymssp.2019.106587
Pfisterer, F., van Rijn, J.N., Probst, P., Müller, A.C., Bischl, B.: Learning multiple defaults for machine learning algorithms. In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 241–242. GECO, Kyoto (2021)
Morgado, S.M.A., Felgueiras, S.: Big Data in Policing: Profiling, patterns, and out of the box thinking. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Ramalho Correia, A.M. (eds.) WorldCIST 2021. AISC, vol. 1365, pp. 217–226. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-72657-7_21
Khanzode, K.C.A., Sarode, R.D.: Advantages and disadvantages of artificial intelligence and machine learning: a literature review. Int. J. Libr. Inf. Sci. (IJLIS) 9(1), 30–36 (2020)
Ray, S.: A quick review of machine learning algorithms. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 35–39. IEEE, India (2019). https://doi.org/10.1109/COMITCon.2019.8862451
Boin, A., Comfort, L.K., Demchak, C.C.: The rise of resilience. Designing Resilience Preparing Extreme Events 1, 1–12 (2010)
Pais, L.G., Felgueiras, S., Rodrigues, A., Santos, J., Varela, T.: Protesto político e atividade policial: a perceção dos” media”. Análise Social 216(3º), 494–517 (2015)
Beridze, I.: Foreword. Special collection: Artificial Intelligence. UNICRI, Torino (2020)
Felgueiras, S., Pais, L.G., Morgado, S.M.A.: Interoperability: Diagnosing a novel assess model. European Law Enforcement Research Bulletin, Special Conference Edition: Innovations in law enforcement: Implications for practice. Educ. Civ. Soc. (4), 255–260 (2018). https://bulletin.cepol.europa.eu/index.php/bulletin/article/view/339/301
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Morgado, S.M.A., Carvalho, M., Felgueiras, S. (2024). Diagnosis Model for Detection of e-threats Against Soft-Targets. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F., Colla, V. (eds) Information Systems and Technologies. WorldCIST 2023. Lecture Notes in Networks and Systems, vol 800. Springer, Cham. https://doi.org/10.1007/978-3-031-45645-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-45645-9_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45644-2
Online ISBN: 978-3-031-45645-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)