did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780471776154

Emergent Information Technologies and Enabling Policies for Counter-Terrorism

by ;
  • ISBN13:

    9780471776154

  • ISBN10:

    0471776157

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2006-06-05
  • Publisher: Wiley-IEEE Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $226.07 Save up to $0.13
  • Buy New
    $225.94
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling Quantitative and computational social science Signal processing and information management techniques Semantic Web and knowledge management technologies Information and intelligence sharing technologies Text/data processing and language translation technologies Social network analysis Legal standards for data mining Potential structures for enabling policies Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

Author Biography

ROBERT L. POPP, PhD, is currently an Executive Vice President of Aptima, Inc., and formerly a senior executive within the Defense Department, serving in the Office of the Secretary of Defense and Defense Advanced Research Projects Agency (DARPA). He is an expert in national security and counter-terrorism, authoring numerous scientific papers and providing many technical briefings and interviews on the subject. He is a member of the Defense Science Board (DSB), Senior Associate for the Center for Strategic and International Studies (CSIS), Senior Member of the IEEE, member of ACM and AAAS, founding Fellow of the University of Connecticut Academy of Distinguished Engineers, and a lifetime member of HOG (the Harley Owners Group).

JOHN YEN, PhD, is currently University Professor of Information Sciences and Technology and Professor in Charge, College of Information Sciences and Technology at The Pennsylvania State University. He is the author of numerous papers, holds one patent, chairs IEEE FIPA standard working groups on human agent communications, and is a member and Fellow of IEEE.

Table of Contents

Foreword vii
Preface ix
Contributors xi
Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat
1(26)
Robert L. Popp
David Allen
Claudio Cioffi-Revilla
Hidden Markov Models and Bayesian Networks for Counter-Terrorism
27(24)
Krishna Pattipati
Peter Willett
Jeffrey Allanach
Haiying Tu
Satnam Singh
Anticipatory Models for Counter-Terrorism
51(24)
Mark Lazaroff
David Snowden
Information Processing at Very High Speed Data Ingestion Rates
75(30)
J. Brian Sharkey
Doyle Weishar
John W. Lockwood
Ron Loui
Richard Rohwer
John Byrnes
Krishna Pattipati
Stephen Eick
David Cousins
Michael Nicoletti
Analysis of Heterogeneous Data in Ultrahigh Dimensions
105(20)
R. A. Ammar
S. A. Demurjian, Sr.
I. R. Greenshields
Krishna Pattipati
S. Rajasekaran
Semantic Web Technologies for Terrorist Network Analysis
125(14)
Jennifer Golbeck
Aaron Mannes
James Hendler
Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies
139(26)
Nazli Choucri
Stuart E. Madnick
Michael D. Siegel
Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery
165(10)
Jeff Jonas
John Karat
Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies
175(22)
Brian Kettler
Gary Edwards
Mark Hoffman
Applying Semantic Web Reasoning to Counter-Terrorism
197(12)
Paul Kogut
Yui Leung
Kathleen M. Ryan
Linda Gohari
Mieczyslaw M. Kotar
Jerzy J. Letkowski
Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts
209(22)
Clifford Behrens
Hyong-Sop Shim
Devaisis Bassu
Sharing Intelligence Using Information Supply Chains
231(24)
Shuang Sun
Xiaocong Fan
John Yen
Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work
255(26)
Michael D. McNeese
Isaac Brewer
Rashaad E. T. Jones
Erik S. Connors
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System
281(18)
Janusz Marecki
Nathan Schurr
Milind Tambe
Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval
299(16)
Douglas W. Oard
Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis
315(16)
Aaron B. Frank
Desmond Saunders-Newton
Behavioral Network Analysis for Terrorist Detection
331(18)
Seth A. Greenblatt
Thayne Coffman
Sherry E. Marcus
Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks
349(18)
Tom Mifflin
Chris Boner
Greg Godfrey
Michael Greenblatt
Social Network Analysis Via Matrix Decompositions
367(26)
D. B. Skillicorn
Legal Standards for Data Mining
393(28)
Fred H. Cate
Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty
421(18)
Paul Rosenzweig
Designing Technical Systems to Support Policy: Enterprise Architecture
439(20)
Policy Appliances
Civil Liberties
K. A. Taipale
Index 459(8)
About the Editors 467

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program