Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model

Tiago Pereira, Henrique Santos

Abstract

The Information Security, nowadays, faces new threats such as the process of massive information in which are applied artificial intelligence techniques with the goal of predicting and classify our actions. Thus, knowledge about our behaviour, likes, dislikes, among others, leads us to consider that Knowledge Security appears has the natural evolution of Information Security. On the other side of the same coin we have new possibilities to monitor health, the wellbeing and abnormal symptoms, reactions to treatments, alert for insulin insufficiency, pacemaker malfunction, among others. Child abuse cases, it is a subject of most importance in our society, although, these cases are, from suspicion to signalization, difficult to identify since strong evidences are needed. Typically, health care services deal with these cases in an earlier stage with evidences based on the emergency diagnosis, but, yet, not sufficient and with lack of information, thus, further analysis is needed from experts’ teams. The main goal of these teams is to protect the child from the possibility of occurrence of more abuses. We have developed a prototype that automatically could predict and alert to situations that could be needed to use the measure of the protection of the child, Using digitalised child abuse processes, knowledge management and artificial intelligence techniques with 83% of true positives. In this research, we addressed both sides of the coin, Knowledge Security and the benefits of the Knowledge Discovery defining, in our opinion, the fourth generation of Knowledge Management - Value Creation and Knowledge.

References

  1. Efraim Turban, R. S. a. D. D. (2010) Decision Support and Business Intelligence Systems. 9 th edn.: Prentice Hall Press Upper Saddle River, NJ, USA.
  2. Hevner, A. and Chatterjee, S. (2010) 'Design Science Research in Information Systems', Design Research in Information Systems Integrated Series in Information Systems: Springer US, pp. 9-22.
  3. HL7, S. W. g. o. 2010. Composite Security and Privacy - Domain analysis Model Report. May 2010 Ballot ed.: HL7.
  4. Hofmann, T. (2001) 'Unsupervised learning by probabilistic latent semantic analysis', Machine Learning, 42(1), pp. 177-196.
  5. IRMA (2013) User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications. IGI Global.
  6. ISO 2013. ISO/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements. ISO.
  7. JN (2013) 'Maus tratos a crianças cada vez mais perversos e difíceis de identificar', Jornal de Notícias. Available at: http://www.jn.pt/PaginaInicial/Sociedade/interior.aspx ?content_id=3529230&page=2 (Accessed: 23-03- 2014).
  8. Mimno, D., Li, W. and McCallum, A. 'Mixtures of hierarchical topics with pachinko allocation'. 633-640.
  9. Oladimeji, E. A., Chung, L., Jung, H. T. and Kim, J. 'Managing Security and Privacy in Ubiquitous eHealth Information Interchange'. ICUIMC 7811. 2011. New York, NY, USA: ACM, 26:1-26:10.
  10. Pereira, T. and Santos, H. (2013) 'Health Care Critical Knowledge Monitor System Model:Health Care Critical Knowledge Ontology Component'. Developing a healthier environment under worldwide economical constraints. SHEWC2013 - XIII Safety, Health and Environment World Congress, Porto, Portugal: COPEC - Science and Education Research Council, 002.
  11. Pereira, T. and Santos, H. (2015) 'Child Abuse Monitor System Model: A Health Care Critical Knowledge Monitor System', in Giaffreda, R., Vieriu, R.-L., Pasher, E., Bendersky, G., Jara, A.J., Rodrigues, J.J.P.C., Dekel, E. & Mandler, B. (eds.) Internet of Things. User-Centric IoT Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Springer International Publishing, pp. 255-261.
  12. Pereira, T. R. and Santos, H. (2012) 'Critical Knowledge Monitor System Model: Healthcare Context'. European Conference on Knowledge Management, Cartagena, Spain, 5-6 September: Academic Conferences International.
  13. Pereira, T. R. and Santos, H. (2013b) 'The Matrix of Quality Dimensions of Knowledge Management: Knowledge Management Assessment Models Review', Knowledge Management: An International Journal, 12(1), pp. 33-41.
  14. Saúde, M. d. 2008. Despacho n.º 31292/2008. 236. Diário da república: INCM.
  15. Steyvers, M. and Griffiths, T. (2007) 'Probabilistic topic models', Handbook of latent semantic analysis, 427(7), pp. 424-440.
  16. WG, H. S. O. 2013. HL7 Version 3 Standard: Security and Privacy Ontology, Release 1. Version 3 ed.: HL7.
Download


Paper Citation


in Harvard Style

Pereira T. and Santos H. (2017). Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model . In Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - Volume 1: ICT4AWE, ISBN 978-989-758-251-6, pages 236-243. DOI: 10.5220/0006384002360243


in Bibtex Style

@conference{ict4awe17,
author={Tiago Pereira and Henrique Santos},
title={Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model},
booktitle={Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - Volume 1: ICT4AWE,},
year={2017},
pages={236-243},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006384002360243},
isbn={978-989-758-251-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information and Communication Technologies for Ageing Well and e-Health - Volume 1: ICT4AWE,
TI - Knowledge Security - An Empirical Use of IT – Child Abuse Monitor System Model
SN - 978-989-758-251-6
AU - Pereira T.
AU - Santos H.
PY - 2017
SP - 236
EP - 243
DO - 10.5220/0006384002360243