Buch, Englisch, Band 2, 442 Seiten, HC gerader Rücken kaschiert, Format (B × H): 161 mm x 240 mm, Gewicht: 830 g
Buch, Englisch, Band 2, 442 Seiten, HC gerader Rücken kaschiert, Format (B × H): 161 mm x 240 mm, Gewicht: 830 g
Reihe: Handbooks in Information Systems
ISBN: 978-0-444-51996-2
Verlag: Elsevier Science Ltd
This book is intended to be used as both a textbook and a comprehensive research handbook. The contributors to this edited volume are renowned experts in their respective fields. Most of the chapters contained in this book provide an updated comprehensive survey of the related field and also specific findings from cutting-edging innovative research. To facilitate its adoption as a textbook, all the authors have included specific discussion questions that could be utilized to stimulate discussions and potentially further research in the area.
- Addresses three major areas of national and international security research from an information systems-centric perspective
- Focuses on legal and policy frameworks, intelligence and security informatics, and emergency preparedness and infrastructure protection
- Real-world case studies are used as examples to provide specific insights
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Preface
Part I: Legal and Policy Frameworks.
Chapter 1: Should commercial misuse of private data be a crime.
Chapter 2: National Information Technology security policies: an overview of issues.
Chapter 3: Economics of the information security investment.
Part II: Intelligence and Security Informatics.
Chapter 4: State of 3D face biometrics for homeland security applications.
Chapter 5: The necessity of fuzzy logic for identity matching.
Chapter 6: Managing real-time bioterrorism surveillance data.
Chapter 7: Spatio-Temporal Data Analysis in Security Informatics.
Chapter 8: Deception and Intention Detection.
Chapter 9: Identification of hidden groups in communications.
Chapter 10: Social network analysis for terrorism research.
Part III: Emergency Preparedness & Infrastructure Protection.
Chapter 11: Disaster response and the local public health department.
Chapter 12: Challenges of bioterrorism preparedness for organizational processes and resources.
Chapter 13: PulseNet: A secure network for real-time global sharing of critical public health information to provide early warning on foodborne disease outbreaks and emergency foodborne pathogens.
Chapter 14: Government agency interoperability in security applications.
Chapter 15: Process-centric risk management framework for information security.
Chapter 16: Intrusion detection and information infrastructure protection.
Chapter 17: Anomaly Based Security Framework for Network Centric Systems.