Communications - Scientific Letters of the University of Zilina 2018, 20(2):78-82 | DOI: 10.26552/com.C.2018.2.78-82
Behaver - Behavioural Patterns Verification for Prevention of Physical Penetration Using Identity Theft
- 1 Department of Security and Safety Research, Faculty of Security Engineering, University of Zilina, Slovakia
- 2 Software Competence Center Hagenberg GMBH, Austria
Nowadays every provider of critical infrastructure is obliged to use alarm systems - mainly simple surveillance CCTV cameras - to increase security and safety of those objects. Yet such systems have proven ineffectual in preventing security disrupting situations, such as identity theft, as the most they can do is offer evidence to identify perpetrators of criminal acts once they have occurred. To use them for crime prevention, specially trained personnel need to monitor all screens constantly on the look-out for potentially dangerous activity - which is financially and time-consuming and prone to mistakes. This study aims at developing semi-automatic video surveillance technologies, which are able to detect events of changed behaviour of employees in relation to their standard behaviour - this means for example cases of identity theft, possible blackmail of a person, or safety disrupting cases - an employee might be sick or under influence of drugs what may lead to potentially dangerous acts.
Keywords: behavioural patterns; CCTV surveillance cameras; crime prevention; identity theft
Published: June 30, 2018 Show citation
ACS | AIP | APA | ASA | Harvard | Chicago | Chicago Notes | IEEE | ISO690 | MLA | NLM | Turabian | Vancouver |
References
- GOODEN, A.: National Identity Crime Operational Lead UK Policing & Identity Security Adviser to Home Office UK Government Department. "Quote to BehaVer". E-mail to prof. HARAN, M., 2017-08-14.
- CUIJPERS, C., SCHROERS, J.: eIDAS as Guideline for the Development of a Pan European eID Framework in FutureID. Proceedings of Open Identity Summit 2014, Germany, 237, 23-38, 2014.
- TRABELSI, S., SENDOR, J., REINICKE, S.: PPL: PrimeLife Privacy Policy Engine. Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), Italy, 184-185, 2011.
Go to original source...
- SABOURI, A., RANNENBERG, K.: ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life. Proceedings of International Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation, Greece, 2014.
Go to original source...
- LIU-JIMENEZ, J., SANCHEZ-REILLO, R., BLANCO-GONZALO, R., FERNANDEZ-SAAVEDRA, B.: Making Stronger Identity for EU Citizens. Proceedings of 49th Annual IEEE International Carnahan Conference on Security Technology (ICCST 2015), Taiwan, 333-339, 2015.
Go to original source...
- GAWANDE, U., GOLHAR, Y., HAJARI, K.: Biometric-Based Security System: Issues and Challenges. Studies in Computational Intelligence, 660, 151-176, 2017.
Go to original source...
- RAJESWARI, P., VISWANADHA RAJU, S., ASHOUR, A. S., DEY, N.: Multi-Fingerprint Unimodel-Based Biometric Authentication Supporting Cloud Computing. Studies in Computational Intelligence, 660, 469-485, 2017.
Go to original source...
- LOVECEK, T., VELAS, A.:Security systems, Alarm systems (in Slovak). EDIS, Zilina, 2015.
- Dupe Facial Recognition Software Using Bespoke Glasses. Available: http://www.prodigitalweb.com/dupe-facial-recognition-software-using-bespoke-glasses/.
- Maris, L. Fanfarova, A.: Modern Training Process in Safety and Security Engineering, Key Engineering Materials, 755, 202-211, 2017.
Go to original source...
- Souleiman, H., O'Riain, S., Curry, E.: Approximate Semantic Matching of Heterogeneous Events. Proceedings of 6th ACM International Conference on Distributed Event-Based Systems (DEBS 2012), Germany, 252-263, 2012.
- Zagorecki, A., Ristvej, J., Klupa, K.: Analytics for Protecting Critical Infrastrusture. Communications - Scientific Letters of the University of Zilina, 17(1), 111-115, 2015.
Go to original source...
- STRELCOVA, S., REHAK, D., JOHNSON, E. A. D.: Influence of Critical Infrastructure on Enterprise Economic Security. Communications - Scientific Letters of the University of Zilina, 17(1), 105-110, 2015.
Go to original source...
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.