Limit search to available items
Book Cover
E-book

Title Emergent information technologies and enabling policies for counter-terrorism / edited by Robert L. Popp, John Yen
Published Hoboken, N.J. : Wiley-Interscience ; Chichester : John Wiley [distributor], ©2006
Online access available from:
Wiley Online Books    View Resource Record  

Copies

Description 1 online resource (xv, 468 pages) : illustrations, portrait
Series IEEE Press series on computational intelligence
IEEE series on computational intelligence.
Contents Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati [and others] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey [and others] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar [and others] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut [and others] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese . [and others] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin [and others] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale
Summary Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks
Bibliography Includes bibliographical references and index
Notes Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
English
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL
Subject Terrorism -- United States -- Prevention
Terrorism -- Government policy -- United States
Terrorism -- Technological innovations -- United States
Information technology -- Government policy -- United States
POLITICAL SCIENCE -- Political Freedom & Security -- Law Enforcement.
Information technology -- Government policy.
Terrorism -- Government policy.
Terrorism -- Prevention.
Terrorism -- Technological innovations.
Informationstechnik
Terrorismus
Bekämpfung
Bekèampfung.
United States.
Form Electronic book
Author Popp, Robert L.
Yen, John.
ISBN 047178656X
9780471786566
0471786551
9780471786559
9780470874103
0470874104
9786610650019
6610650012