*Last Update: November 30, 2011  

Call for Papers | Call for Special Sessions | Call for Workshop | Call for Tutorial Participant | Paper Submissions

1 Malaysia    HIS 2011

  

» HOME » CALL FOR PAPERS » IMPORTANT DATES » PAPER SUBMISSIONS » CAMERA-READY GUIDELINES » INVITED SPEAKERS » TECHNICAL PROGRAM » DOWNLOAD » COMMITTEE » SPONSORSHIPS » REGISTRATION » CONFERENCE VENUE » HOW TO GET TO MELAKA » ACCOMMODATION » SOCIAL PROGRAMS » LOCAL INFORMATION » CONTACT US

JOURNAL SPECIAL ISSUES

Related Conference:

HIS 2011

I N V I T E D    S P E A K E R S :: ___________________________________________________
Keynote Speakers || Tutorial Speakers ||

 

Tutorial Speakers :: ____________________________________________________
Hideyuki Takagi||Ponnuthurai Nagaratnam Suganthan||Ajith Abraham||Pieter Hartel||Mohd Shazri Shahrir

peitel.jpg
Prof Pieter Hartel, University of Twente

Pieter Hartel received his Master degree in Mathematics and Computer Science from the Free University of Amsterdam in 1978 and his PhD degree in Computer Science from the University of Amsterdam in 1989. He has worked at CERN in Geneva (Switzerland), the Universities of Nijmegen, Amsterdam (The Netherlands), and Southampton (UK). He is currently a full Professor of Computer Science at the University of Twente. His research interests are Information Security and Crime Science.

 

Abstract

On the Future of Cybercrime
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world.