000 08566nam a2200985 i 4500
001 5444075
003 IEEE
005 20200421114118.0
006 m o d
007 cr |n|||||||||
008 151221s2010 njuac ob 001 eng d
020 _a9780470874103
_qelectronic
020 _a0470874104
020 _z9780471776154
_qprint
020 _z9780471786559
_qelectronic
024 7 _a10.1109/9780470874103
_2doi
035 _a(CaBNVSL)mat05444075
035 _a(IDAMS)0b000064812228cf
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
043 _an-us---
050 4 _aHV6431
_b.E487 2006eb
050 4 _aHV6431 .E487 2006eb
082 0 4 _a363.3202854
_222
082 0 0 _a363.3250285
245 0 0 _aEmergent information technologies and enabling policies for counter-terrorism /
_cedited by Robert L. Popp, John Yen.
264 1 _aHoboken, New Jersey :
_bWiley-Interscience,
_cc2006.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2010]
300 _a1 PDF (xv, 468 pages) :
_billustrations, port..
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aIEEE press series on computational intelligence ;
_v6
504 _aIncludes bibliographical references and index.
505 0 _aForeword -- Preface -- Contributors -- Chapter 1: Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1 (Robert L. Popp, David Allen, and Claudio Cioffi-Revilla) -- Chapter 2: Hidden Markov Models and Bayesian Networks for Counter-Terrorism (Krishna Pattipati, Peter Willett, Jeffrey Allanach, Haiying Tu, and Satnam Singh) -- Chapter 3: Anticipatory Models for Counter-Terrorism (Mark Lazaroff and David Snowden) -- Chapter 4: Information Processing at Very High Speed Data Ingestion Rates (J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna Pattipati, Stephen Eick, David Cousins, and Michael Nicoletti) -- Chapter 5: Analysis of Heterogeneous Data in Ultrahigh Dimensions (R. A. Ammar, S. A. Demurjian , Sr., I. R. Greenshields, Krishna Pattipati, and S. Rajasekaran) -- Chapter 6: Semantic Web Technologies for Terrorist Network Analysis (Jennifer Golbeck, Aaron Mannes, and James Hendler) -- Chapter 7: Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies (Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel) -- Chapter 8: Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery (Jeff Jonas and John Karat) -- Chapter 9: Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies (Brian Kettler, Gary Edwards, and Mark Hoffman) -- Chapter 10: Applying Semantic Web Reasoning to Counter-Terrorism (Paul Kogut, Yui Leung, Kathleen M. Ryan, Linda Gohari, Mieczyslaw M. Kotar, and Jerzy J. Letkowski) -- Chapter 11: Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts (Clifford Behrens, Hyong-Sop Shim, and Devaisis Bassu) -- Chapter 12: Sharing Intelligence Using Information Supply Chains (Shuang Sun, Xiaocong Fan, and John Yen) -- Chapter 13: Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work (Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, and Erik S. Connors).
505 8 _aChapter 14: Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System (Janusz Marecki, Nathan Schurr, and Milind Tambe) -- Chapter 15: Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval (Douglas W. Oard) -- Chapter 16: Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis (Aaron B. Frank and Desmond Saunders-Newton) -- Chapter 17: Behavioral Network Analysis for Terrorist Detection (Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus) -- Chapter 18: Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks (Tom Mifflin, Chris Boner, Greg Godfrey, and Michael Greenblatt) -- Chapter 19: Social Network Analysis Via Matrix Decompositions (D. B. Skillicorn) -- Chapter 20: Legal Standards for Data Mining (Fred H. Cate) -- Chapter 21: Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty (Paul Rosenzweig) -- Chapter 22: Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties (K. A. Taipale) -- Index -- About the Editors.
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _aExplores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: . Counter-terrorism modeling. Quantitative and computational social science. Signal processing and information management techniques. Semantic Web and knowledge management technologies. Information and intelligence sharing technologies. Text/data processing and language translation technologies. Social network analysis. Legal standards for data mining. Potential structures for enabling policies. Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 12/21/2015.
650 0 _aTerrorism
_zUnited States
_xPrevention.
650 0 _aTerrorism
_xGovernment policy
_zUnited States.
650 0 _aTerrorism
_xTechnological innovations
_zUnited States.
650 0 _aInformation technology
_xGovernment policy
_zUnited States.
655 0 _aElectronic books.
695 _aArtificial intelligence
695 _aBiographies
695 _aBiological system modeling
695 _aBrowsers
695 _aCorrelation
695 _aDatabases
695 _aDecision making
695 _aEconomic indicators
695 _aEigenvalues and eigenfunctions
695 _aEquations
695 _aGoogle
695 _aGovernment
695 _aHeart rate variability
695 _aHeating
695 _aHidden Markov models
695 _aHome appliances
695 _aHumans
695 _aIndexes
695 _aIndexing
695 _aInformation filters
695 _aKnowledge based systems
695 _aMathematical model
695 _aNoise
695 _aProduction
695 _aStochastic processes
695 _aSubscriptions
695 _aTerrorism
695 _aTesting
695 _aVariable speed drives
695 _aVisualization
695 _aWeapons
700 1 _aYen, John.
700 1 _aPopp, Robert L.
710 2 _aJohn Wiley & Sons,
_epublisher.
710 2 _aIEEE Xplore (Online service),
_edistributor.
776 0 8 _iPrint version:
_z9780471776154
830 0 _aIEEE series on computational intelligence ;
_v6
856 4 2 _3Abstract with links to resource
_uhttp://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075
942 _cEBK
999 _c59637
_d59637