scholarly journals Digital Technologies in the Analysis of the State of Crime in the Prosecutor's Office

2021 ◽  
Vol 8 (1) ◽  
pp. 37-44
Author(s):  
Eduard B. Khatov

The article is devoted to the perspectives of digital technologies in crime analysis. According to the author, the key role of such analysis performed by prosecutors is played by artificial intelligence technologies, extra-big data, and electronic voice assistants. The need for their implementation, appropriate material and technical support, solutions for information security issues, as well as the training of prosecutors in the use of digital technologies, including the basics of programming and visualization of big data, were emphasized.

2018 ◽  
Vol 5 (2) ◽  
pp. 205395171880855 ◽  
Author(s):  
Thomas Birtchnell

Since the inception of recorded music there has been a need for standards and reliability across sound formats and listening environments. The role of the audio mastering engineer is prestigious and akin to a craft expert combining scientific knowledge, musical learning, manual precision and skill, and an awareness of cultural fashions and creative labour. With the advent of algorithms, big data and machine learning, loosely termed artificial intelligence in this creative sector, there is now the possibility of automating human audio mastering processes and radically disrupting mastering careers. The emergence of dedicated products and services in artificial intelligence-driven audio mastering poses profound questions for the future of the music industry, already having faced significant challenges due to the digitalization of music over the past decades. The research reports on qualitative and ethnographic inquiry with audio mastering engineers on the automation of their expertise and the potential for artificial intelligence to augment or replace aspects of their workflows. Investigating audio mastering engineers' awareness of artificial intelligence, the research probes the importance of criticality in their labour. The research identifies intuitive performance and critical listening as areas where human ingenuity and communication pose problems for simulation. Affective labour disrupts speculation of algorithmic domination by highlighting the pragmatic strategies available for humans to adapt and augment digital technologies.


Urban Studies ◽  
2021 ◽  
pp. 004209802110140
Author(s):  
Sarah Barns

This commentary interrogates what it means for routine urban behaviours to now be replicating themselves computationally. The emergence of autonomous or artificial intelligence points to the powerful role of big data in the city, as increasingly powerful computational models are now capable of replicating and reproducing existing spatial patterns and activities. I discuss these emergent urban systems of learned or trained intelligence as being at once radical and routine. Just as the material and behavioural conditions that give rise to urban big data demand attention, so do the generative design principles of data-driven models of urban behaviour, as they are increasingly put to use in the production of replicable, autonomous urban futures.


2006 ◽  
Vol 36 (1) ◽  
pp. 73
Author(s):  
Freddy Harris ◽  
Bono Budi Priambodo

The authors here explain regarding the role of regulation to anticipating information security By sociological approaches it has reflected on the Indonesian conditions which had not adequate organized. Existing arranged is limited on certain sectors. social group. and corporations group either domestic and multinational levels. Most efforts to reach to better level have been initiated by many parties such as public sector. education. information technology industrial. professional community and civil. Here also recommended needs for clear policy and the whole implementation which be coordinated integrally under government chief's. Government leads under the authority to accomplishing the state under effective law and regulations


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


2016 ◽  
Vol 3 (2) ◽  
pp. 50
Author(s):  
Hood Laeeq ◽  
Arfan Shahzad ◽  
Subramaniam Sri Ramalu ◽  
Muhammad Fareed

In the last three decades, the security issues have been raised in the state of the Punjab (Pakistan) which ultimately leads to the breakdown of the country’s economy. However, the purpose of this paper is to determine the effect of the political interference on the performance of Punjab police (Pakistan) with the moderating role of organizational support. To elicit the findings, a total of 159 survey questionnaires were compiled from station house officers (SHOs) of Punjab police (Pakistan). Furthermore, this study has applied PLS-SEM technique to analyze the data. The findings reveal that a negatively significant effect of political interference on the performance of Punjab police (Pakistan). Moreover, the findings also showed the significant moderating effect of organizational support in the instance of political interference.


Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


Author(s):  
Heru Susanto ◽  
Leu Fang Yie ◽  
Didi Rosiyadi ◽  
Akbari Indra Basuki ◽  
Desi Setiana

Digital ecosystems have grown rapidly over the years, and governments are investing in digital provision for their processes and services. Despite the advantages of distributed technologies, there are many security issues as well that result in breaches of data privacy with serious impact including legal and reputational implications. To deal with such threats, government agencies need to thoughtfully improve their security defences to protect data and systems by using automation and artificial intelligence (AI), as well as easing the data security measures including early warning of threats and detection. This study provides a comprehensive view of AI and automaton to highlight challenges and issues concerning data security and suggests steps to combat the issues. The authors demonstrate the role of AI-driven security tools and automation to mitigate the impact of data breaches to also propose recommendations for government agencies to enhance their data security protection.


Author(s):  
Aboobucker Ilmudeen

Today, the terms big data, artificial intelligence, and internet of things (IoT) are many-fold as these are linked with various applications, technologies, eco-systems, and services in the business domain. The recent industrial and technological revolution have become popular ever before, and the cross-border e-commerce activities are emerging very rapidly. As a result, it supports to the growth of economic globalization that has strategic importance for the advancement of e-commerce activities across the globe. In the business industry, the wide range applications of technologies like big data, artificial intelligence, and internet of things in cross-border e-commerce have grown exponential. This chapter systematically reviews the role of big data, artificial intelligence, and IoT in cross-border e-commerce and proposes a conceptually-designed smart-integrated cross-border e-commerce platform.


2022 ◽  
pp. 261-278

The formal response to COVID-19 through ICT is presented with a focus on testing COVID-19, ICTs and tracking COVID-19, ICTs and COVID-19 treatment, and policies and strategies. The chapter highlights the critical role of ICTs and e-government for technologies to fight coronavirus. It covers delivery of remote learning, ICT trends, artificial intelligence (AI), and big data in fighting the pandemic, in addition to social media application for awareness of citizens such as emergencies, protection, and pandemic news. The notion of developing an information and communication strategy for redesigning smart city transformation in a pandemic is highlighted.


Sign in / Sign up

Export Citation Format

Share Document