Out of the ordinary: finding hidden threats by analyzing unusual behavior
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Santa Monica, Calif.
RAND Corp.
2004
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "MG-126-RC.". - Title from title screen (viewed 11/23/2004) Includes bibliographical references (pages 151-155) and appendices Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture |
Beschreibung: | 1 Online-Ressource (xxx, 155 pages) |
ISBN: | 0833035207 0833048171 9780833035202 9780833048172 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043124051 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2004 |||| o||u| ||||||eng d | ||
020 | |a 0833035207 |9 0-8330-3520-7 | ||
020 | |a 0833048171 |9 0-8330-4817-1 | ||
020 | |a 9780833035202 |9 978-0-8330-3520-2 | ||
020 | |a 9780833048172 |9 978-0-8330-4817-2 | ||
035 | |a (OCoLC)57032533 | ||
035 | |a (DE-599)BVBBV043124051 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 363.32 |2 22 | |
245 | 1 | 0 | |a Out of the ordinary |b finding hidden threats by analyzing unusual behavior |c John Hollywood [and others] |
264 | 1 | |a Santa Monica, Calif. |b RAND Corp. |c 2004 | |
300 | |a 1 Online-Ressource (xxx, 155 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "MG-126-RC.". - Title from title screen (viewed 11/23/2004) | ||
500 | |a Includes bibliographical references (pages 151-155) and appendices | ||
500 | |a Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described | ||
500 | |a Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Security (National & International) |2 bisacsh | |
650 | 7 | |a Crime forecasting |2 fast | |
650 | 7 | |a Criminal behavior, Prediction of |2 fast | |
650 | 7 | |a Criminal methods |2 fast | |
650 | 7 | |a Intelligence service |2 fast | |
650 | 7 | |a National security |2 fast | |
650 | 7 | |a Terrorism / Forecasting |2 fast | |
650 | 7 | |a Terrorism / Psychological aspects |2 fast | |
650 | 4 | |a Psychologie | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Criminal behavior, Prediction of |z United States | |
650 | 4 | |a Crime forecasting |z United States | |
650 | 4 | |a Criminal methods |z United States | |
650 | 4 | |a Terrorism |x Forecasting | |
650 | 4 | |a Terrorism |x Psychological aspects | |
650 | 4 | |a Intelligence service |z United States | |
650 | 4 | |a National security |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Hollywood, John S. |e Sonstige |4 oth | |
710 | 2 | |a Rand Corporation |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028548242 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175556256727040 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043124051 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)57032533 (DE-599)BVBBV043124051 |
dewey-full | 363.32 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.32 |
dewey-search | 363.32 |
dewey-sort | 3363.32 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03424nmm a2200637zc 4500</leader><controlfield tag="001">BV043124051</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833035207</subfield><subfield code="9">0-8330-3520-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833048171</subfield><subfield code="9">0-8330-4817-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833035202</subfield><subfield code="9">978-0-8330-3520-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833048172</subfield><subfield code="9">978-0-8330-4817-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)57032533</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043124051</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.32</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Out of the ordinary</subfield><subfield code="b">finding hidden threats by analyzing unusual behavior</subfield><subfield code="c">John Hollywood [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, Calif.</subfield><subfield code="b">RAND Corp.</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 155 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG-126-RC.". - Title from title screen (viewed 11/23/2004)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 151-155) and appendices</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National & International)</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crime forecasting</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal behavior, Prediction of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal methods</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intelligence service</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Forecasting</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism / Psychological aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Psychologie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal behavior, Prediction of</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime forecasting</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminal methods</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Forecasting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Psychological aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence service</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hollywood, John S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028548242</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043124051 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:10Z |
institution | BVB |
isbn | 0833035207 0833048171 9780833035202 9780833048172 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028548242 |
oclc_num | 57032533 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxx, 155 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | RAND Corp. |
record_format | marc |
spelling | Out of the ordinary finding hidden threats by analyzing unusual behavior John Hollywood [and others] Santa Monica, Calif. RAND Corp. 2004 1 Online-Ressource (xxx, 155 pages) txt rdacontent c rdamedia cr rdacarrier "MG-126-RC.". - Title from title screen (viewed 11/23/2004) Includes bibliographical references (pages 151-155) and appendices Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh POLITICAL SCIENCE / Security (National & International) bisacsh Crime forecasting fast Criminal behavior, Prediction of fast Criminal methods fast Intelligence service fast National security fast Terrorism / Forecasting fast Terrorism / Psychological aspects fast Psychologie Terrorismus Criminal behavior, Prediction of United States Crime forecasting United States Criminal methods United States Terrorism Forecasting Terrorism Psychological aspects Intelligence service United States National security United States USA Hollywood, John S. Sonstige oth Rand Corporation Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908 Aggregator Volltext |
spellingShingle | Out of the ordinary finding hidden threats by analyzing unusual behavior POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh POLITICAL SCIENCE / Security (National & International) bisacsh Crime forecasting fast Criminal behavior, Prediction of fast Criminal methods fast Intelligence service fast National security fast Terrorism / Forecasting fast Terrorism / Psychological aspects fast Psychologie Terrorismus Criminal behavior, Prediction of United States Crime forecasting United States Criminal methods United States Terrorism Forecasting Terrorism Psychological aspects Intelligence service United States National security United States |
title | Out of the ordinary finding hidden threats by analyzing unusual behavior |
title_auth | Out of the ordinary finding hidden threats by analyzing unusual behavior |
title_exact_search | Out of the ordinary finding hidden threats by analyzing unusual behavior |
title_full | Out of the ordinary finding hidden threats by analyzing unusual behavior John Hollywood [and others] |
title_fullStr | Out of the ordinary finding hidden threats by analyzing unusual behavior John Hollywood [and others] |
title_full_unstemmed | Out of the ordinary finding hidden threats by analyzing unusual behavior John Hollywood [and others] |
title_short | Out of the ordinary |
title_sort | out of the ordinary finding hidden threats by analyzing unusual behavior |
title_sub | finding hidden threats by analyzing unusual behavior |
topic | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement bisacsh POLITICAL SCIENCE / Security (National & International) bisacsh Crime forecasting fast Criminal behavior, Prediction of fast Criminal methods fast Intelligence service fast National security fast Terrorism / Forecasting fast Terrorism / Psychological aspects fast Psychologie Terrorismus Criminal behavior, Prediction of United States Crime forecasting United States Criminal methods United States Terrorism Forecasting Terrorism Psychological aspects Intelligence service United States National security United States |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Law Enforcement POLITICAL SCIENCE / Security (National & International) Crime forecasting Criminal behavior, Prediction of Criminal methods Intelligence service National security Terrorism / Forecasting Terrorism / Psychological aspects Psychologie Terrorismus Criminal behavior, Prediction of United States Crime forecasting United States Criminal methods United States Terrorism Forecasting Terrorism Psychological aspects Intelligence service United States National security United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304908 |
work_keys_str_mv | AT hollywoodjohns outoftheordinaryfindinghiddenthreatsbyanalyzingunusualbehavior AT randcorporation outoftheordinaryfindinghiddenthreatsbyanalyzingunusualbehavior |