Emergent information technologies and enabling policies for counter-terrorism:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley-Interscience
c2006
|
Schriftenreihe: | IEEE series on computational intelligence
|
Schlagworte: | |
Online-Zugang: | FRO01 TUM01 Volltext |
Beschreibung: | Includes bibliographical references and index Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- - Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- - Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks |
Beschreibung: | 1 Online-Ressource (xv, 468 p.) |
ISBN: | 0470874104 0471776157 0471786551 047178656X 9780470874103 9780471776154 9780471786559 9780471786566 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV040768852 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130221s2006 |||| o||u| ||||||eng d | ||
020 | |a 0470874104 |9 0-470-87410-4 | ||
020 | |a 0471776157 |9 0-471-77615-7 | ||
020 | |a 0471786551 |c Online |9 0-471-78655-1 | ||
020 | |a 047178656X |9 0-471-78656-X | ||
020 | |a 9780470874103 |9 978-0-470-87410-3 | ||
020 | |a 9780471776154 |9 978-0-471-77615-4 | ||
020 | |a 9780471786559 |c Online |9 978-0-471-78655-9 | ||
020 | |a 9780471786566 |9 978-0-471-78656-6 | ||
024 | 7 | |a 10.1002/047178656X |2 doi | |
035 | |a (OCoLC)730302603 | ||
035 | |a (DE-599)BVBBV040768852 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-861 | ||
082 | 0 | |a 004 | |
245 | 1 | 0 | |a Emergent information technologies and enabling policies for counter-terrorism |c edited by Robert L. Popp, John Yen |
264 | 1 | |a Hoboken, N.J. |b Wiley-Interscience |c c2006 | |
300 | |a 1 Online-Ressource (xv, 468 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IEEE series on computational intelligence | |
500 | |a Includes bibliographical references and index | ||
500 | |a Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- | ||
500 | |a - Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- | ||
500 | |a - Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale | ||
500 | |a Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement |2 bisacsh | |
650 | 7 | |a Informationstechnik |2 swd | |
650 | 7 | |a Terrorismus |2 swd | |
650 | 7 | |a Bekämpfung |2 swd | |
650 | 4 | |a Politik | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Terrorism / United States / Prevention | |
650 | 4 | |a Terrorism / Government policy / United States | |
650 | 4 | |a Terrorism / United States / Technological innovations | |
650 | 4 | |a Information technology / Government policy / United States | |
650 | 4 | |a POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement / bisacsh | |
650 | 4 | |a Informationstechnik / swd | |
650 | 4 | |a Terrorismus / swd | |
650 | 4 | |a Bekämpfung / swd | |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Popp, Robert L. |e Sonstige |4 oth | |
700 | 1 | |a Yen, John |e Sonstige |4 oth | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X |x Verlag |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q FHR_PDA_WIC | |
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-025747270 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X |l TUM01 |p ZDB-35-WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804150098452545536 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV040768852 |
collection | ZDB-35-WIC |
ctrlnum | (OCoLC)730302603 (DE-599)BVBBV040768852 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06068nmm a2200793zc 4500</leader><controlfield tag="001">BV040768852</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130221s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470874104</subfield><subfield code="9">0-470-87410-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471776157</subfield><subfield code="9">0-471-77615-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471786551</subfield><subfield code="c">Online</subfield><subfield code="9">0-471-78655-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">047178656X</subfield><subfield code="9">0-471-78656-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470874103</subfield><subfield code="9">978-0-470-87410-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471776154</subfield><subfield code="9">978-0-471-77615-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471786559</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-471-78655-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471786566</subfield><subfield code="9">978-0-471-78656-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/047178656X</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)730302603</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040768852</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Emergent information technologies and enabling policies for counter-terrorism</subfield><subfield code="c">edited by Robert L. Popp, John Yen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 468 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IEEE series on computational intelligence</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / Government policy / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / United States / Technological innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Government policy / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informationstechnik / swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus / swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bekämpfung / swd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Popp, Robert L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yen, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FHR_PDA_WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025747270</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV040768852 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:33:31Z |
institution | BVB |
isbn | 0470874104 0471776157 0471786551 047178656X 9780470874103 9780471776154 9780471786559 9780471786566 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025747270 |
oclc_num | 730302603 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-861 |
owner_facet | DE-91 DE-BY-TUM DE-861 |
physical | 1 Online-Ressource (xv, 468 p.) |
psigel | ZDB-35-WIC FHR_PDA_WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Wiley-Interscience |
record_format | marc |
series2 | IEEE series on computational intelligence |
spelling | Emergent information technologies and enabling policies for counter-terrorism edited by Robert L. Popp, John Yen Hoboken, N.J. Wiley-Interscience c2006 1 Online-Ressource (xv, 468 p.) txt rdacontent c rdamedia cr rdacarrier IEEE series on computational intelligence Includes bibliographical references and index Utilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- - Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- - Journey from analysis to inquiry : technology and transformation of counter-terrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Informationstechnik swd Terrorismus swd Bekämpfung swd Politik Terrorismus Terrorism / United States / Prevention Terrorism / Government policy / United States Terrorism / United States / Technological innovations Information technology / Government policy / United States POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement / bisacsh Informationstechnik / swd Terrorismus / swd Bekämpfung / swd Terrorismus (DE-588)4059534-1 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf USA Informationstechnik (DE-588)4026926-7 s Terrorismus (DE-588)4059534-1 s Bekämpfung (DE-588)4112701-8 s 1\p DE-604 Popp, Robert L. Sonstige oth Yen, John Sonstige oth https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Emergent information technologies and enabling policies for counter-terrorism POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Informationstechnik swd Terrorismus swd Bekämpfung swd Politik Terrorismus Terrorism / United States / Prevention Terrorism / Government policy / United States Terrorism / United States / Technological innovations Information technology / Government policy / United States POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement / bisacsh Informationstechnik / swd Terrorismus / swd Bekämpfung / swd Terrorismus (DE-588)4059534-1 gnd Informationstechnik (DE-588)4026926-7 gnd Bekämpfung (DE-588)4112701-8 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)4026926-7 (DE-588)4112701-8 |
title | Emergent information technologies and enabling policies for counter-terrorism |
title_auth | Emergent information technologies and enabling policies for counter-terrorism |
title_exact_search | Emergent information technologies and enabling policies for counter-terrorism |
title_full | Emergent information technologies and enabling policies for counter-terrorism edited by Robert L. Popp, John Yen |
title_fullStr | Emergent information technologies and enabling policies for counter-terrorism edited by Robert L. Popp, John Yen |
title_full_unstemmed | Emergent information technologies and enabling policies for counter-terrorism edited by Robert L. Popp, John Yen |
title_short | Emergent information technologies and enabling policies for counter-terrorism |
title_sort | emergent information technologies and enabling policies for counter terrorism |
topic | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh Informationstechnik swd Terrorismus swd Bekämpfung swd Politik Terrorismus Terrorism / United States / Prevention Terrorism / Government policy / United States Terrorism / United States / Technological innovations Information technology / Government policy / United States POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement / bisacsh Informationstechnik / swd Terrorismus / swd Bekämpfung / swd Terrorismus (DE-588)4059534-1 gnd Informationstechnik (DE-588)4026926-7 gnd Bekämpfung (DE-588)4112701-8 gnd |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement Informationstechnik Terrorismus Bekämpfung Politik Terrorism / United States / Prevention Terrorism / Government policy / United States Terrorism / United States / Technological innovations Information technology / Government policy / United States POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement / bisacsh Informationstechnik / swd Terrorismus / swd Bekämpfung / swd USA |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/047178656X |
work_keys_str_mv | AT popprobertl emergentinformationtechnologiesandenablingpoliciesforcounterterrorism AT yenjohn emergentinformationtechnologiesandenablingpoliciesforcounterterrorism |