Popp / Yen | Emergent Information Technologies and Enabling Policies for Counter-Terrorism | E-Book | sack.de
E-Book

E-Book, Englisch, 480 Seiten, E-Book

Reihe: IEEE Press Series on Computational Intelligence

Popp / Yen Emergent Information Technologies and Enabling Policies for Counter-Terrorism


1. Auflage 2006
ISBN: 978-0-471-78655-9
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 480 Seiten, E-Book

Reihe: IEEE Press Series on Computational Intelligence

ISBN: 978-0-471-78655-9
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Explores both counter-terrorism and enabling policy dimensionsof emerging information technologies in national security
After the September 11th attacks, "connecting the dots" hasbecome the watchword for using information and intelligence toprotect the United States from future terrorist attacks. Advancedand emerging information technologies offer key assets inconfronting a secretive, asymmetric, and networked enemy. Yet, in afree and open society, policies must ensure that these powerfultechnologies are used responsibly, and that privacy and civilliberties remain protected.
Emergent Information Technologies and Enabling Policies forCounter-Terrorism provides a unique, integrated treatment ofcutting-edge counter-terrorism technologies and their correspondingpolicy options. Featuring contributions from nationally recognizedauthorities and experts, this book brings together a diverseknowledge base for those charged with protecting our nation fromterrorist attacks while preserving our civil liberties.
Topics covered include:
* Counter-terrorism modeling
* Quantitative and computational social science
* Signal processing and information management techniques
* Semantic Web and knowledge management technologies
* Information and intelligence sharing technologies
* Text/data processing and language translation technologies
* Social network analysis
* Legal standards for data mining
* Potential structures for enabling policies
* Technical system design to support policy
Countering terrorism in today's world requires innovativetechnologies and corresponding creative policies; the two cannot bepractically and realistically addressed separately. EmergentInformation Technologies and Enabling Policies forCounter-Terrorism offers a comprehensive examination of both areas,serving as an essential resource for students, practitioners,researchers, developers, and decision-makers.

Popp / Yen Emergent Information Technologies and Enabling Policies for Counter-Terrorism jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Foreword.
Preface.
Contributors.
Chapter 1: Utilizing Information and Social Science Technologyto Understand and Counter the Twenty-First Century Strategic Threat1 (Robert L. Popp, David Allen, and ClaudioCioffi-Revilla).
Chapter 2: Hidden Markov Models and Bayesian Networks forCounter-Terrorism (Krishna Pattipati, Peter Willett, JeffreyAllanach, Haiying Tu, and Satnam Singh).
Chapter 3: Anticipatory Models for Counter-Terrorism (MarkLazaroff and David Snowden).
Chapter 4: Information Processing at Very High Speed DataIngestion Rates (J. Brian Sharkey, Doyle Weishar, John W.Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna Pattipati,Stephen Eick, David Cousins, and Michael Nicoletti).
Chapter 5: Analysis of Heterogeneous Data in UltrahighDimensions (R. A. Ammar, S. A. Demurjian , Sr., I. R.Greenshields, Krishna Pattipati, and S. Rajasekaran).
Chapter 6: Semantic Web Technologies for Terrorist NetworkAnalysis (Jennifer Golbeck, Aaron Mannes, and JamesHendler).
Chapter 7: Improving National and Homeland Security ThroughContext Knowledge Representation and Reasoning Technologies(Nazli Choucri, Stuart E. Madnick, and Michael D.Siegel).
Chapter 8: Anonymized Semantic Directories and aPrivacy-Enhancing Architecture for Enterprise Discovery (JeffJonas and John Karat).
Chapter 9: Facilitating Information Sharing Across IntelligenceCommunity Boundaries Using Knowledge Management and Semantic WebTechnologies (Brian Kettler, Gary Edwards, and MarkHoffman).
Chapter 10: Applying Semantic Web Reasoning to Counter-Terrorism(Paul Kogut, Yui Leung, Kathleen M. Ryan, Linda Gohari,Mieczyslaw M. Kotar, and Jerzy J. Letkowski).
Chapter 11: Schemer: Consensus-Based Knowledge Validation andCollaboration Services for Virtual Teams of Intelligence Experts(Clifford Behrens, Hyong-Sop Shim, and Devaisis Bassu).
Chapter 12: Sharing Intelligence Using Information Supply Chains(Shuang Sun, Xiaocong Fan, and John Yen).
Chapter 13: Supporting Knowledge Management In Emergency CrisisManagement Domains: Envisioned Designs for Collaborative Work(Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, and ErikS. Connors).
Chapter 14: Agent-Based Simulations for Disaster Rescue Usingthe DEFACTO Coordination System (Janusz Marecki, Nathan Schurr,and Milind Tambe).
Chapter 15: Transcending the Tower of Babel: Supporting Accessto Multilingual Information with Cross-Language InformationRetrieval (Douglas W. Oard).
Chapter 16: Journey from Analysis to Inquiry: Technology andTransformation of Counter-Terrorism Analysis (Aaron B. Frank andDesmond Saunders-Newton).
Chapter 17: Behavioral Network Analysis for Terrorist Detection(Seth A. Greenblatt, Thayne Coffman, and Sherry E.Marcus).
Chapter 18: Detecting Terrorist Activities in the Twenty-FirstCentury: A Theory of Detection for Transactional Networks (TomMifflin, Chris Boner, Greg Godfrey, and MichaelGreenblatt).
Chapter 19: Social Network Analysis Via Matrix Decompositions(D. B. Skillicorn).
Chapter 20: Legal Standards for Data Mining (Fred H.Cate).
Chapter 21: Privacy and Consequences: Legal and PolicyStructures for Implementing New Counter-Terrorism Technologies andProtecting Civil Liberty (Paul Rosenzweig).
Chapter 22: Designing Technical Systems to Support Policy:Enterprise Architecture, Policy Appliances, and Civil Liberties(K. A. Taipale).
Index.
About the Editors.


ROBERT L. POPP, PhD, is currently an Executive VicePresident of Aptima, Inc., and formerly a senior executive withinthe Defense Department, serving in the Office of the Secretary ofDefense and Defense Advanced Research Projects Agency (DARPA). Heis an expert in national security and counter-terrorism, authoringnumerous scientific papers and providing many technical briefingsand interviews on the subject. He is a member of the DefenseScience Board (DSB), Senior Associate for the Center for Strategicand International Studies (CSIS), Senior Member of the IEEE, memberof ACM and AAAS, founding Fellow of the University of ConnecticutAcademy of Distinguished Engineers, and a lifetime member of HOG(the Harley Owners Group).
JOHN YEN, PhD, is currently University Professor ofInformation Sciences and Technology and Professor in Charge,College of Information Sciences and Technology at The PennsylvaniaState University. He is the author of numerous papers, holds onepatent, chairs IEEE FIPA standard working groups on human agentcommunications, and is a member and Fellow of IEEE.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.