
Emergent Information Technologies and Enabling Policies for Counter Terrorism
Robert L. Popp, John Yen - Collection IEEE Press Series on Computational Intelligence
Résumé
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security
After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected.
Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties.
Topics covered include:
- Counter-terrorism modeling
- Quantitative and computational social science
- Signal processing and information management techniques
- Semantic Web and knowledge management technologies
- Information and intelligence sharing technologies
- Text/data processing and language translation technologies
- Social network analysis
- Legal standards for data mining
- Potential structures for enabling policies
- Technical system design to support policy
Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately.
Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.
Sommaire
- Utilizing information and social science technology to understand and counter the twenty-first century strategic threat
- Hidden Markov models and Bayesian networks for counter-terrorism
- Anticipatory models for counter-terrorism
- Information processing at very high speed data ingestion rates
- Analysis of heterogeneous data in ultrahigh dimensions
- Semantic Web technologies for terrorist network analysis
- Improving national and homeland security through context knowledge representation and reasoning technologies
- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery
- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic Web technologies
- Applying semantic Web reasoning to counter-terrorism
- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts
- Sharing intelligence using information supply chains
- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work
- Agent-based simulations for disaster rescue using the DEFACTO coordination system
- Transcending the Tower of Babel : supporting access to multilingual information with cross-language information retrieval
- Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis
- Behavioral network analysis for terrorist detection
- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks
- Social network analysis via matrix decompositions
- Legal standards for data mining
- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty
- Designing technical systems to support policy : enterprise architecture, policy appliances, and civil liberties
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley, IEEE Press |
Auteur(s) | Robert L. Popp, John Yen |
Collection | IEEE Press Series on Computational Intelligence |
Parution | 26/07/2006 |
Nb. de pages | 484 |
Format | 19 x 26 |
Couverture | Relié |
Poids | 975g |
Intérieur | Noir et Blanc |
EAN13 | 9780471776154 |
ISBN13 | 978-0-471-77615-4 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Bases de données
- Informatique Informatique d'entreprise Conception et développement web Intranet et portails
- Informatique Informatique d'entreprise Knowledge management
- Informatique Informatique d'entreprise Data warehouse et data mining
- Informatique Informatique d'entreprise Stockage - Backup
- Informatique Développement d'applications Techniques de programmation Programmation fonctionnelle
- Informatique Développement d'applications Techniques de programmation Programmation parallèle et multithreading
- Informatique Développement d'applications Algorithmique et informatique appliquée
- Informatique Développement d'applications Technologies objet Programmation objet
- Informatique Réseaux et télecommunications