Introduction The European Parliament recognises that a new industrial revolution is underway, one... more Introduction The European Parliament recognises that a new industrial revolution is underway, one that is led by networked digital services. Wanting to understand the implications associated with the capabilities afforded by these technologies, a short study was commissioned. The Study Group was given four topics to investigate, both independently and in conjunction with each other. The objective was to uncover the potential positive and negative policy and regulatory implications of their widespread adoption. The topics to be studied were: • Big | Fast | Open Data • Crypto Currency • Collaborative Internet Technologies • Additive Manufacturing: including three dimensional (3D) printing Due to the brevity of the study and the corresponding few resources to deploy, the Study Group adopted a simplified hybrid Delphi 1 / ASHEN 2 method as the foundation of their study plan. This method was followed, to gather relevant data and analyse the collected data. It is Important to note that the views of industry and academic thought 1 A strategic foresight method, developed by RAND Corp: http://www.rand.org/ topics/delphi-method.html 2A knowledge elicitation technique developed by Cognitive Edge: http://cognitive-edge.com/methods/ashen/ leaders were combined in this study. All views expressed were used to develop a comprehensive set of policy options that were delivered to the STOA Unit of the EP with a final report.
In the recent years we have witnessed a number of important terroristic incidents, in major citie... more In the recent years we have witnessed a number of important terroristic incidents, in major cities all around the world (e.g., 911 in New York, 11-M in Madrid, 7/7 in London). These incidents have revealed the vulnerabilities of urban environments, against terroristic plans and have created significant pressure towards devising novel tools and techniques for timely predicting the intentions and plans of terrorists. In this paper, we introduce a blueprint Internet-of-Things architecture for predicting terroristic attacks. The architecture allows Law enforcement agencies to exploit multiple data sources, (including SIGINT, OSINT and HUMINT) towards acquiring information associated with terroristic action, while at the same time providing powerful reasoning capabilities towards transforming raw events into meaningful alerts. We also illustrate the implementation of a terroristic prediction system based on this architecture, along with its use in the scope of a validating scenario.
Introduction The European Parliament recognises that a new industrial revolution is underway, one... more Introduction The European Parliament recognises that a new industrial revolution is underway, one that is led by networked digital services. Wanting to understand the implications associated with the capabilities afforded by these technologies, a short study was commissioned. The Study Group was given four topics to investigate, both independently and in conjunction with each other. The objective was to uncover the potential positive and negative policy and regulatory implications of their widespread adoption. The topics to be studied were: • Big | Fast | Open Data • Crypto Currency • Collaborative Internet Technologies • Additive Manufacturing: including three dimensional (3D) printing Due to the brevity of the study and the corresponding few resources to deploy, the Study Group adopted a simplified hybrid Delphi 1 / ASHEN 2 method as the foundation of their study plan. This method was followed, to gather relevant data and analyse the collected data. It is Important to note that the views of industry and academic thought 1 A strategic foresight method, developed by RAND Corp: http://www.rand.org/ topics/delphi-method.html 2A knowledge elicitation technique developed by Cognitive Edge: http://cognitive-edge.com/methods/ashen/ leaders were combined in this study. All views expressed were used to develop a comprehensive set of policy options that were delivered to the STOA Unit of the EP with a final report.
In the recent years we have witnessed a number of important terroristic incidents, in major citie... more In the recent years we have witnessed a number of important terroristic incidents, in major cities all around the world (e.g., 911 in New York, 11-M in Madrid, 7/7 in London). These incidents have revealed the vulnerabilities of urban environments, against terroristic plans and have created significant pressure towards devising novel tools and techniques for timely predicting the intentions and plans of terrorists. In this paper, we introduce a blueprint Internet-of-Things architecture for predicting terroristic attacks. The architecture allows Law enforcement agencies to exploit multiple data sources, (including SIGINT, OSINT and HUMINT) towards acquiring information associated with terroristic action, while at the same time providing powerful reasoning capabilities towards transforming raw events into meaningful alerts. We also illustrate the implementation of a terroristic prediction system based on this architecture, along with its use in the scope of a validating scenario.
Uploads
Papers by John Soldatos