Acta Informatica Pragensia 2015, 4(1), 44-51 | DOI: 10.18267/j.aip.592854
Context Sources and their Processing in Company Security
- Department of Informatics, Faculty of Science, J. E. Purkinje University, Ceske mladeze 8, 400 96 Usti nad Labem, Czech Republic
This article deals with the problem of critical employees' oversight. In the article is proposed set of processes which can with cooperation with Data Mining and Ambient Intelligence, in some cases, predict behaviour and movement of monitored objects/people based on reasoned context from set of different sources. The difference between prediction and observed reality can be evaluated and based on rules and gathered information about context can be taken action to prevent security breach and damages to the company. At the end a case scenario is presented which demonstrate behaviour of the system and possible options how the system can prevent damages to assets.
Keywords: Ambient Intelligence, Context, Security, Process, Surveillance, Security Management
Received: March 18, 2015; Revised: June 4, 2015; Accepted: June 20, 2015; Published: June 30, 2015 Show citation
References
- Dourish, P. (2004). What we talk about when we talk about context. Personal and Ubiquitous Computing, 8(1), 19-30.
Go to original source...
- Hong, JY., Suh, EH., Kim, J., & Kim, S. (2009). Context-aware system for proactive personalized service based on context history. Expert Systems with Applications, 36(4) 7448-7457.
Go to original source...
- Ko, H., Marrieros, G., An, K., Vale, Z. Kim, T., & Choi, J. (2011). Contexts-Management Strategy with Security Consideration in Urban Computing based on urban design. In 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2011), pp.65-72, Seoul: Korean Bible University.
Go to original source...
- Mesicek, L., & Svoboda, J. (2012). Composition of ICT Project Teams from Social Network Analysis Point of View. In Proceedings of the 13th European Conference on Knowledge Management (pp. 1462-1470). Cartagena.
- Preuveneers, D., Van den Bergh, J., Wagelaar, D., Georges, A., Rigole, P., Clerckx, T., Berbers, Y., Coninx, K., Jonckers, V., De Bosschere, K. (2004). Towards an extensible context ontology for ambient intelligence. In Ambient Intelligence, Proceedings (pp. 148-159). Eindhoven: Springer.
Go to original source...
- Rabari, C., & Storper, M. (2015). The digital skin of cities: urban theory and research in the age of the sensored and metered city, ubiquitous computing and big data. Cambridge Journal of Regions Economy and Society, 8(1) pp. 27-42.
Go to original source...
- Vokorokos, L., Balas, A., & Mados, B. (2012). Intrusion Detection Architecture Utilizing Graphics Processors. Acta Informatica Pragensia, 1(1), 50-59.
Go to original source...
- Xu, C., Hu, QH., Xu, GQ., & Feng, ZY. (2014). An approach to facial expression analysis with multi-model interactions. International Journal of Computer Mathematics, 91(11), 2329-2340.
Go to original source...
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.