Department of Information Technology

Arena Security

At the Department of Information Technology we run a wide variety of projects related to IT and security.

Security is a broad area with many different meanings. One view is that security is about protecting people, places, strategic sites and society's vital functions against for example terrorism, organized crime, and natural disasters. Intelligence and Security Informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. Examples of research in this area are:

  • Information sharing and data/text mining (e.g web analysis, HCI and user interfaces of relevance to intelligence and security, intelligence knowledge discovery).
  • Information system security (e.g intrusion detection, information systems security policies, cyber crime and social impacts, market influence analytics and media intelligence, ethical and integrity issues).
  • Security and values (e.g how security levels and parameters are defined in relation to significant values and societal vital functions)
  • Terrorism informatics (e.g social network analysis, countering terrorism, analytical knowledge and software tools).
  • Border/transport security (e.g situation awareness, data fusion, and risk assessment).
  • Cyber security (e.g Cyber-crime detection and analysis, e-commerce, viruses, and identity fraud).

Awards

  • Amendra Shrestha and Lisa Kaati together with their co-author Fredrik Johansson won the best paper award at IEEE Joint Intelligence and Security Informatics Conference for their paper Time Profiles for Identifying Users in Online Environments. The conference took place September 24-26, 2014 in the Hague.
  • Amendra Shrestha won the prize for best poster for his poster: A Tool For Visualizing and Analyzing Users on Discussion Boards, at the European Intelligence and Security Informatics Conference (EISIC) 2013.

Publications

3.1. Social media analytics

Identifying warning behaviors of violent lone offenders in written communication. Lisa Kaati, Amendra Shrestha, and Tony Sardella. In Proc. 16th ICDM Workshops, pp 1053-1060, IEEE Computer Society, 2016. (DOI, fulltext:postprint).
Multi-domain alias matching using machine learning. Michael Ashcroft, Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 3rd European Network Intelligence Conference, pp 77-84, IEEE, 2016. (DOI, fulltext:postprint).
Automatic detection of xenophobic narratives: A case study on Swedish alternative media. Lisa Kaati, Amendra Shrestha, Katie Cohen, and Sinna Lindquist. In Proc. 14th International Conference on Intelligence and Security Informatics, pp 121-126, IEEE, 2016. (DOI).
Measuring online affects in a white supremacy forum. Léo Figea, Lisa Kaati, and Ryan Scrivens. In Proc. 14th International Conference on Intelligence and Security Informatics, pp 85-90, IEEE, 2016. (DOI).
Linguistic analysis of lone offender manifestos. Lisa Kaati, Amendra Shrestha, and Katie Cohen. In Proc. 4th International Conference on Cybercrime and Computer Forensics, IEEE, 2016. (DOI).
Semantic technologies for detecting names of new drugs on darknets. Lisa Kaati, Fredrik Johansson, and Elinor Forsman. In Proc. 4th International Conference on Cybercrime and Computer Forensics, IEEE, 2016. (DOI).
Countering lone actor terrorism: Weak signals and online activities. Lisa Kaati and Fredrik Johansson. In Understanding Lone Actor Terrorism: Past experience, future outlook, and response strategies, pp 266-279, Routledge, Abingdon, UK, 2016. (DOI).
Internet of Things and Future Threats Towards our Society. Torbjörn Fängström and Lisa Kaati. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
Detecting multipliers of jihadism on twitter. Lisa Kaati, Enghin Omer, Nico Prucha, and Amendra Shrestha. In Proc. 15th ICDM Workshops, pp 954-960, IEEE Computer Society, 2015. (DOI).
Timeprints for identifying social media users with multiple aliases. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Security Informatics, volume 4, pp 7:1-11, 2015. (DOI, Fulltext).
Detecting jihadist messages on twitter. Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. In Proc. 5th European Intelligence and Security Informatics Conference, pp 161-164, IEEE Computer Society, 2015. (DOI).
A step towards detecting online grooming: Identifying adults pretending to be children. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. 5th European Intelligence and Security Informatics Conference, pp 98-104, IEEE Computer Society, 2015. (DOI).
Time profiles for identifying users in online environments. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 1st Joint Intelligence and Security Informatics Conference, pp 83-90, IEEE Computer Society, 2014. (DOI).
Analysis and mining of tags, (micro)blogs, and virtual communities. Lisa Kaati. In Encyclopedia of Social Network Analysis and Mining, pp 19-25, Springer, 2014. (DOI).
Activity profiles in online social media. Mohamed Faouzi Atig, Sofia Cassel, Lisa Kaati, and Amendra Shrestha. In Proc. 6th International Conference on Advances in Social Networks Analysis and Mining, pp 850-855, IEEE Computer Society, 2014. (DOI).
Author recognition in discussion boards. Amendra Shrestha, Lisa Kaati, Sofia Cassel, and Mohamed Faouzi Atig. In National Symposium on Technology and Methodology for Security and Crisis Management, 2013.
Detecting multiple aliases in social media. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 5th International Conference on Advances in Social Networks Analysis and Mining, pp 1004-1011, ACM Press, New York, 2013. (DOI).
A tool for visualizing and analyzing users on discussion boards. Amendra Shrestha. In European Intelligence and Security Informatics Conference: 2013, pp 229-229, IEEE Computer Society, 2013. (DOI, Fulltext).

3.2. Ethics, privacy, and environmental security

ICT and sustainability: skills and methods for dialogue and policy making. Iordanis Kavathatzopoulos. In Journal of Information, Communication and Ethics in Society, volume 13, number 1, pp 13-18, Emerald Group Publishing Limited, 2015. (DOI).
Independent agents and ethics. Iordanis Kavathatzopoulos. In ICT and society, volume 431 of IFIP Advances in Information and Communication Technology, pp 39-46, Springer Berlin/Heidelberg, 2014. (DOI).
Philosophical method and the conflict liberty-security. Iordanis Kavathatzopoulos and Ryoko Asai. In Proceedings ETHICOMP 2014Li: berty and security in an age of ICTs, UPMC - Sorbonne Universités, Paris, 2014. (External link).
Social Influence on Cooperation and Coordination. Ryoko Asai. In ICT-ethics: Sweden and Japan, volume 15 of Studies in Applied Ethics, pp 24-30, LiU Tryck, Linköping, 2013.
How to handle issues of security and privacy. Iordanis Kavathatzopoulos. In ICT-ethics: Sweden and Japan, volume 15 of Studies in Applied Ethics, pp 54-60, LiU Tryck, Linköping, 2013.
Struntar regeringen i rätten till personlig integritet?. Göran Collste, Iordanis Kavathatzopoulos, and Elin Palm. In Svenska Dagbladet, volume 1 nov., Stockholm, 2013. (External link).
Can machines make ethical decisions?. Iordanis Kavathatzopoulos and Ryoko Asai. In Artificial Intelligence Applications and Innovations, volume 412 of IFIP Advances in Information and Communication Technology, pp 693-699, Springer Berlin/Heidelberg, 2013. (DOI).
Methods for IT security and privacy. Iordanis Kavathatzopoulos and Ryoko Asai. In ICT, society and human beings, pp 155-158, IADIS Press, Prague, 2013.
Tools and methods for security: Stimulating the skill to philosophize. Iordanis Kavathatzopoulos, Ryoko Asai, and Mikael Laaksoharju. In European Intelligence and Security Informatics Conference: 2013, pp 163-165, IEEE Computer Society, 2013. (DOI).
IT security and sustainability. Iordanis Kavathatzopoulos and Ryoko Asai. In ICT for Sustainability: Sustainability, Social Accountability and Computing, ETH, Zurich, 2013. (External link).

Faktaruta

Arena Security är en del av Institutionen för informationsteknologi som är belägen i hus 1 på Informationsteknologiskt Centrum (ITC).

Personer som arbetar med säkerhet på Institutionen för informationsteknologi
Iordanis Kavathatzopoulos
Per Gunningberg
Christian Rohner
Torbjörn Fängström
Johan Fernquist
Amendra Shrestha

Kontaktinformation

Updated  2017-12-05 19:54:03 by Lisa Kaati.