Emergent Information Technologies and Enabling Policies for Counter-Terrorism (eBook)
480 Seiten
Wiley (Verlag)
978-0-471-78655-9 (ISBN)
ROBERT L. POPP, PhD, is currently an Executive Vice President of Aptima, Inc., and formerly a senior executive within the Defense Department, serving in the Office of the Secretary of Defense and Defense Advanced Research Projects Agency (DARPA). He is an expert in national security and counter-terrorism, authoring numerous scientific papers and providing many technical briefings and interviews on the subject. He is a member of the Defense Science Board (DSB), Senior Associate for the Center for Strategic and International Studies (CSIS), Senior Member of the IEEE, member of ACM and AAAS, founding Fellow of the University of Connecticut Academy of Distinguished Engineers, and a lifetime member of HOG (the Harley Owners Group). JOHN YEN, PhD, is currently University Professor of Information Sciences and Technology and Professor in Charge, College of Information Sciences and Technology at The Pennsylvania State University. He is the author of numerous papers, holds one patent, chairs IEEE FIPA standard working groups on human agent communications, and is a member and Fellow of IEEE.
Foreword.
Preface.
Contributors.
Chapter 1: Utilizing Information and Social Science Technology
to Understand and Counter the Twenty-First Century Strategic Threat
1 (Robert L. Popp, David Allen, and Claudio
Cioffi-Revilla).
Chapter 2: Hidden Markov Models and Bayesian Networks for
Counter-Terrorism (Krishna Pattipati, Peter Willett, Jeffrey
Allanach, Haiying Tu, and Satnam Singh).
Chapter 3: Anticipatory Models for Counter-Terrorism (Mark
Lazaroff and David Snowden).
Chapter 4: Information Processing at Very High Speed Data
Ingestion Rates (J. Brian Sharkey, Doyle Weishar, John W.
Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna Pattipati,
Stephen Eick, David Cousins, and Michael Nicoletti).
Chapter 5: Analysis of Heterogeneous Data in Ultrahigh
Dimensions (R. A. Ammar, S. A. Demurjian , Sr., I. R.
Greenshields, Krishna Pattipati, and S. Rajasekaran).
Chapter 6: Semantic Web Technologies for Terrorist Network
Analysis (Jennifer Golbeck, Aaron Mannes, and James
Hendler).
Chapter 7: Improving National and Homeland Security Through
Context Knowledge Representation and Reasoning Technologies
(Nazli Choucri, Stuart E. Madnick, and Michael D.
Siegel).
Chapter 8: Anonymized Semantic Directories and a
Privacy-Enhancing Architecture for Enterprise Discovery (Jeff
Jonas and John Karat).
Chapter 9: Facilitating Information Sharing Across Intelligence
Community Boundaries Using Knowledge Management and Semantic Web
Technologies (Brian Kettler, Gary Edwards, and Mark
Hoffman).
Chapter 10: Applying Semantic Web Reasoning to Counter-Terrorism
(Paul Kogut, Yui Leung, Kathleen M. Ryan, Linda Gohari,
Mieczyslaw M. Kotar, and Jerzy J. Letkowski).
Chapter 11: Schemer: Consensus-Based Knowledge Validation and
Collaboration Services for Virtual Teams of Intelligence Experts
(Clifford Behrens, Hyong-Sop Shim, and Devaisis Bassu).
Chapter 12: Sharing Intelligence Using Information Supply Chains
(Shuang Sun, Xiaocong Fan, and John Yen).
Chapter 13: Supporting Knowledge Management In Emergency Crisis
Management Domains: Envisioned Designs for Collaborative Work
(Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, and Erik
S. Connors).
Chapter 14: Agent-Based Simulations for Disaster Rescue Using
the DEFACTO Coordination System (Janusz Marecki, Nathan Schurr,
and Milind Tambe).
Chapter 15: Transcending the Tower of Babel: Supporting Access
to Multilingual Information with Cross-Language Information
Retrieval (Douglas W. Oard).
Chapter 16: Journey from Analysis to Inquiry: Technology and
Transformation of Counter-Terrorism Analysis (Aaron B. Frank and
Desmond Saunders-Newton).
Chapter 17: Behavioral Network Analysis for Terrorist Detection
(Seth A. Greenblatt, Thayne Coffman, and Sherry E.
Marcus).
Chapter 18: Detecting Terrorist Activities in the Twenty-First
Century: A Theory of Detection for Transactional Networks (Tom
Mifflin, Chris Boner, Greg Godfrey, and Michael
Greenblatt).
Chapter 19: Social Network Analysis Via Matrix Decompositions
(D. B. Skillicorn).
Chapter 20: Legal Standards for Data Mining (Fred H.
Cate).
Chapter 21: Privacy and Consequences: Legal and Policy
Structures for Implementing New Counter-Terrorism Technologies and
Protecting Civil Liberty (Paul Rosenzweig).
Chapter 22: Designing Technical Systems to Support Policy:
Enterprise Architecture, Policy Appliances, and Civil Liberties
(K. A. Taipale).
Index.
About the Editors.
Erscheint lt. Verlag | 11.10.2006 |
---|---|
Reihe/Serie | IEEE Press Series on Computational Intelligence |
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik |
Sozialwissenschaften ► Politik / Verwaltung | |
Schlagworte | Computer Science • Database & Data Warehousing Technologies • Datenbanken u. Data Warehousing • Gewerbe- u. Technikrecht • Informatik • Informationstechnologie • Information Technologies • Law • Rechtswissenschaft • Trade & Technology Law |
ISBN-10 | 0-471-78655-1 / 0471786551 |
ISBN-13 | 978-0-471-78655-9 / 9780471786559 |
Haben Sie eine Frage zum Produkt? |
![PDF](/img/icon_pdf_big.jpg)
Größe: 15,3 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich