National security:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier
2007
|
Schriftenreihe: | Handbooks in information systems
v. 2 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- - Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- - 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational |
Beschreibung: | 1 Online-Ressource (xxii, 419 pages) |
ISBN: | 0080479618 9780080479613 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043087199 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080479618 |c electronic bk. |9 0-08-047961-8 | ||
020 | |a 9780080479613 |c electronic bk. |9 978-0-08-047961-3 | ||
035 | |a (OCoLC)164864207 | ||
035 | |a (DE-599)BVBBV043087199 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a National security |c edited by H. Chen [and others] |
264 | 1 | |a Amsterdam |b Elsevier |c 2007 | |
300 | |a 1 Online-Ressource (xxii, 419 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Handbooks in information systems |v v. 2 | |
500 | |a Includes bibliographical references and index | ||
500 | |a Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- | ||
500 | |a - Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- | ||
500 | |a - 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of | ||
500 | |a This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational | ||
650 | 4 | |a National security / United States | |
650 | 4 | |a Terrorism / United States / Prevention | |
650 | 4 | |a Threats of violence | |
650 | 4 | |a United States / Military policy | |
650 | 4 | |a Military Science | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Data mining |2 fast | |
650 | 7 | |a Expert systems (Computer science) |2 fast | |
650 | 7 | |a National security |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Expert systems (Computer science) | |
650 | 4 | |a Data mining | |
650 | 4 | |a National security | |
651 | 4 | |a USA | |
700 | 1 | |a Chen, Hsinchun |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 0-444-51996-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-444-51996-2 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028511391 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175484676734976 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043087199 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)164864207 (DE-599)BVBBV043087199 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05962nmm a2200637zcb4500</leader><controlfield tag="001">BV043087199</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080479618</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-047961-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080479613</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-047961-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)164864207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043087199</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">National security</subfield><subfield code="c">edited by H. Chen [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 419 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Handbooks in information systems</subfield><subfield code="v">v. 2</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"> - 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Threats of violence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">United States / Military policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military Science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Expert systems (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Expert systems (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Hsinchun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">0-444-51996-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-444-51996-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028511391</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043087199 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:01Z |
institution | BVB |
isbn | 0080479618 9780080479613 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028511391 |
oclc_num | 164864207 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxii, 419 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Elsevier |
record_format | marc |
series2 | Handbooks in information systems |
spelling | National security edited by H. Chen [and others] Amsterdam Elsevier 2007 1 Online-Ressource (xxii, 419 pages) txt rdacontent c rdamedia cr rdacarrier Handbooks in information systems v. 2 Includes bibliographical references and index Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- - Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- - 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational National security / United States Terrorism / United States / Prevention Threats of violence United States / Military policy Military Science COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data mining fast Expert systems (Computer science) fast National security fast Terrorismus Computer networks Security measures Expert systems (Computer science) Data mining National security USA Chen, Hsinchun Sonstige oth Erscheint auch als Druck-Ausgabe, Hardcover 0-444-51996-3 Erscheint auch als Druck-Ausgabe, Hardcover 978-0-444-51996-2 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229 Aggregator Volltext |
spellingShingle | National security National security / United States Terrorism / United States / Prevention Threats of violence United States / Military policy Military Science COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data mining fast Expert systems (Computer science) fast National security fast Terrorismus Computer networks Security measures Expert systems (Computer science) Data mining National security |
title | National security |
title_auth | National security |
title_exact_search | National security |
title_full | National security edited by H. Chen [and others] |
title_fullStr | National security edited by H. Chen [and others] |
title_full_unstemmed | National security edited by H. Chen [and others] |
title_short | National security |
title_sort | national security |
topic | National security / United States Terrorism / United States / Prevention Threats of violence United States / Military policy Military Science COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data mining fast Expert systems (Computer science) fast National security fast Terrorismus Computer networks Security measures Expert systems (Computer science) Data mining National security |
topic_facet | National security / United States Terrorism / United States / Prevention Threats of violence United States / Military policy Military Science COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Data mining Expert systems (Computer science) National security Terrorismus Computer networks Security measures USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=196229 |
work_keys_str_mv | AT chenhsinchun nationalsecurity |