Terrorism Informatics (eBook)

Knowledge Management and Data Mining for Homeland Security
eBook Download: PDF
2008 | 2008
XLII, 558 Seiten
Springer US (Verlag)
978-0-387-71613-8 (ISBN)

Lese- und Medienproben

Terrorism Informatics -
Systemvoraussetzungen
106,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.



The lead author is an editor for the IEEE Int. conference on Intelligence and Security Informatics and the founder of ISI conferences.
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and they involve the collection of a mass of information from multiple sources and in numerous languages. TERRORISM INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches.

The lead author is an editor for the IEEE Int. conference on Intelligence and Security Informatics and the founder of ISI conferences.

Methodological Issues in Terrorism Research.- Domain Mapping of Contemporary Terrorism Research.- Research on Terrorism.- Who Are the Key Figures in ‘Terrorism Studies’?.- Interviewing Terrorists.- Resolving a Terrorist Insurgency by Addressing Its Root Causes.- A Quantitative Analysis of ‘Root Causes of Conflict’.- Countering Terrorism with Knowledge.- Toward a Target-specific Method of Threat Assessment.- Identifying and Exploiting Group Learning Patterns for Counterterrorism.- Homeland Insecurity.- Terrorism Informatics to Support Prevention, Detection, and Response.- Case Study of Jihad on the Web.- Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System.- Content Analysis of Jihadi Extremist Groups' Videos.- Analysis of Affect Intensities in Extremist Group Forums.- Document Selection for Extracting Entity and Relationship Instances of Terrorist Events.- Data Distortion Methods and Metrics in a Terrorist Analysis System.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- Individual and Collective Analysis of Anomalies in Message Traffic.- Addressing Insider Threat through Cost-Sensitive Document Classification.- Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs.- Automatic Extraction of Deceptive Behavioral Cues from Video.- Situational Awareness Technologies for Disaster Response.

Erscheint lt. Verlag 17.6.2008
Reihe/Serie Integrated Series in Information Systems
Integrated Series in Information Systems
Zusatzinfo XLII, 558 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Web / Internet
Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
Sozialwissenschaften Politik / Verwaltung
Wirtschaft Allgemeines / Lexika
Schlagworte Computer Science • Content • counterterrorism • Data Mining • Homeland Security • Information • information systems • Information Technology (IT) • Internet • knowledge management • learning • mapping • organization • Policy • privacy • search engine marketing (SEM) • security • service-oriented computing • terrorism • terrorism informatics • Text Mining • Web • Web mining
ISBN-10 0-387-71613-0 / 0387716130
ISBN-13 978-0-387-71613-8 / 9780387716138
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 31,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Grundkurs für Ausbildung und Praxis

von Ralf Adams

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
29,99
Das umfassende Handbuch

von Wolfram Langer

eBook Download (2023)
Rheinwerk Computing (Verlag)
34,93
Das umfassende Lehrbuch

von Michael Kofler

eBook Download (2024)
Rheinwerk Computing (Verlag)
34,93