Out of the ordinary :: finding hidden threats by analyzing unusual behavior /
Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypo...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, Calif. :
RAND Corp.,
2004.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described. |
Beschreibung: | "MG-126-RC." Title from title screen (viewed 11/23/2004). |
Beschreibung: | 1 online resource (xxx, 155 pages :) |
Bibliographie: | Includes bibliographical references (pages 151-155) and appendices. |
ISBN: | 9780833048172 0833048171 9781598754131 1598754130 1282451227 9781282451223 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm57032533 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 041123s2004 cauad ob 000 0 eng | ||
040 | |a SNM |b eng |e pn |c SNM |d OCLCQ |d BAKER |d OCLCG |d UBY |d N$T |d IDEBK |d E7B |d OCLCQ |d CLU |d B24X7 |d OCLCQ |d OCLCA |d JSTOR |d OCLCF |d OCLCO |d OCLCQ |d YDXCP |d EBLCP |d MHW |d DEBSZ |d AU@ |d OCLCO |d OCLCA |d UAT |d OCLCO |d OCLCQ |d OCLCO |d OCLCA |d OCLCQ |d CUS |d AGLDB |d OCLCQ |d MERUC |d OCLCQ |d VT2 |d LND |d LOA |d ICG |d VNS |d U3W |d VTS |d CEF |d JBG |d OCLCQ |d ERL |d STF |d M8D |d OCLCQ |d OCLCO |d OCLCQ |d INARC |d OCLCO |d UEJ |d OCLCQ |d OCLCL | ||
019 | |a 475945224 |a 567536189 |a 647832753 |a 816361327 |a 846901271 |a 855305369 |a 1008957787 |a 1044426691 |a 1060933181 |a 1069645607 |a 1073077977 |a 1115071305 |a 1152993942 |a 1401741081 | ||
020 | |a 9780833048172 |q (electronic bk.) | ||
020 | |a 0833048171 |q (electronic bk.) | ||
020 | |a 9781598754131 |q (electronic bk.) | ||
020 | |a 1598754130 |q (electronic bk.) | ||
020 | |a 1282451227 | ||
020 | |a 9781282451223 | ||
020 | |z 0833035207 | ||
020 | |z 9780833035202 | ||
027 | |a RAND/MG-126-RC | ||
035 | |a (OCoLC)57032533 |z (OCoLC)475945224 |z (OCoLC)567536189 |z (OCoLC)647832753 |z (OCoLC)816361327 |z (OCoLC)846901271 |z (OCoLC)855305369 |z (OCoLC)1008957787 |z (OCoLC)1044426691 |z (OCoLC)1060933181 |z (OCoLC)1069645607 |z (OCoLC)1073077977 |z (OCoLC)1115071305 |z (OCoLC)1152993942 |z (OCoLC)1401741081 | ||
037 | |a 22573/cttdfh6 |b JSTOR | ||
043 | |a n-us--- | ||
050 | 4 | |a HV6080 |b .O97 2004 | |
072 | 7 | |a POL |x 014000 |2 bisacsh | |
072 | 7 | |a POL012000 |2 bisacsh | |
072 | 7 | |a POL011000 |2 bisacsh | |
072 | 7 | |a POL037000 |2 bisacsh | |
072 | 7 | |a JPSH, JPWL |2 bicssc | |
082 | 7 | |a 363.32 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Out of the ordinary : |b finding hidden threats by analyzing unusual behavior / |c John Hollywood [and others]. |
260 | |a Santa Monica, Calif. : |b RAND Corp., |c 2004. | ||
300 | |a 1 online resource (xxx, 155 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
347 | |b PDF | ||
500 | |a "MG-126-RC." | ||
504 | |a Includes bibliographical references (pages 151-155) and appendices. | ||
500 | |a Title from title screen (viewed 11/23/2004). | ||
520 | |a Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described. | ||
505 | 0 | |a Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture. | |
650 | 0 | |a Criminal behavior, Prediction of |z United States. | |
650 | 0 | |a Crime forecasting |z United States. | |
650 | 0 | |a Criminal methods |z United States. | |
650 | 0 | |a Terrorism |x Forecasting. | |
650 | 0 | |a Terrorism |x Psychological aspects. | |
650 | 0 | |a Intelligence service |z United States. |0 http://id.loc.gov/authorities/subjects/sh85067179 | |
650 | 0 | |a National security |z United States. |0 http://id.loc.gov/authorities/subjects/sh85140387 | |
650 | 6 | |a Criminalité |x Prévision |z États-Unis. | |
650 | 6 | |a Modus operandi (Criminologie) |z États-Unis. | |
650 | 6 | |a Terrorisme |x Prévision. | |
650 | 6 | |a Terrorisme |x Aspect psychologique. | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Law Enforcement. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Security (National & International) |2 bisacsh | |
650 | 7 | |a Crime forecasting |2 fast | |
650 | 7 | |a Criminal behavior, Prediction of |2 fast | |
650 | 7 | |a Criminal methods |2 fast | |
650 | 7 | |a Intelligence service |2 fast | |
650 | 7 | |a National security |2 fast | |
650 | 7 | |a Terrorism |x Forecasting |2 fast | |
650 | 7 | |a Terrorism |x Psychological aspects |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Hollywood, John S., |d 1973- | |
710 | 2 | |a Rand Corporation. | |
758 | |i has work: |a Out of the ordinary (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH4q6fX3XyBdmjcXCWX6JC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Out of the ordinary. |z 0833035207 |w (DLC) 2003023703 |w (OCoLC)53356475 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908 |3 Volltext | |
938 | |a Books 24x7 |b B247 |n bkg00011904 | ||
938 | |a Baker & Taylor |b BKTY |c 27.50 |d 20.63 |i 0833035207 |n 0004358101 |s active | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL236877 | ||
938 | |a EBSCOhost |b EBSC |n 304908 | ||
938 | |a Internet Archive |b INAR |n outofordinaryfin0000unse | ||
938 | |a YBP Library Services |b YANK |n 3151681 | ||
938 | |a YBP Library Services |b YANK |n 2627606 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm57032533 |
---|---|
_version_ | 1813903277647986688 |
adam_text | |
any_adam_object | |
author2 | Hollywood, John S., 1973- |
author2_role | |
author2_variant | j s h js jsh |
author_corporate | Rand Corporation |
author_corporate_role | |
author_facet | Hollywood, John S., 1973- Rand Corporation |
author_sort | Hollywood, John S., 1973- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6080 |
callnumber-raw | HV6080 .O97 2004 |
callnumber-search | HV6080 .O97 2004 |
callnumber-sort | HV 46080 O97 42004 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture. |
ctrlnum | (OCoLC)57032533 |
dewey-full | 363.32 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.32 |
dewey-search | 363.32 |
dewey-sort | 3363.32 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05265cam a2200925 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm57032533 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">041123s2004 cauad ob 000 0 eng </controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">SNM</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">SNM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BAKER</subfield><subfield code="d">OCLCG</subfield><subfield code="d">UBY</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CLU</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MHW</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UAT</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CUS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">LND</subfield><subfield code="d">LOA</subfield><subfield code="d">ICG</subfield><subfield code="d">VNS</subfield><subfield code="d">U3W</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ERL</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">475945224</subfield><subfield code="a">567536189</subfield><subfield code="a">647832753</subfield><subfield code="a">816361327</subfield><subfield code="a">846901271</subfield><subfield code="a">855305369</subfield><subfield code="a">1008957787</subfield><subfield code="a">1044426691</subfield><subfield code="a">1060933181</subfield><subfield code="a">1069645607</subfield><subfield code="a">1073077977</subfield><subfield code="a">1115071305</subfield><subfield code="a">1152993942</subfield><subfield code="a">1401741081</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833048172</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833048171</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781598754131</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1598754130</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282451227</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282451223</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0833035207</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780833035202</subfield></datafield><datafield tag="027" ind1=" " ind2=" "><subfield code="a">RAND/MG-126-RC</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)57032533</subfield><subfield code="z">(OCoLC)475945224</subfield><subfield code="z">(OCoLC)567536189</subfield><subfield code="z">(OCoLC)647832753</subfield><subfield code="z">(OCoLC)816361327</subfield><subfield code="z">(OCoLC)846901271</subfield><subfield code="z">(OCoLC)855305369</subfield><subfield code="z">(OCoLC)1008957787</subfield><subfield code="z">(OCoLC)1044426691</subfield><subfield code="z">(OCoLC)1060933181</subfield><subfield code="z">(OCoLC)1069645607</subfield><subfield code="z">(OCoLC)1073077977</subfield><subfield code="z">(OCoLC)1115071305</subfield><subfield code="z">(OCoLC)1152993942</subfield><subfield code="z">(OCoLC)1401741081</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/cttdfh6</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6080</subfield><subfield code="b">.O97 2004</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL011000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">JPSH, JPWL</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.32</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Out of the ordinary :</subfield><subfield code="b">finding hidden threats by analyzing unusual behavior /</subfield><subfield code="c">John Hollywood [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, Calif. :</subfield><subfield code="b">RAND Corp.,</subfield><subfield code="c">2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxx, 155 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="b">PDF</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG-126-RC."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 151-155) and appendices.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen (viewed 11/23/2004).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal behavior, Prediction of</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Crime forecasting</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal methods</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Forecasting.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Psychological aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service</subfield><subfield code="z">United States.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85067179</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="z">United States.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85140387</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité</subfield><subfield code="x">Prévision</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Modus operandi (Criminologie)</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Prévision.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Aspect psychologique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Law Enforcement.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Security (National & International)</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crime forecasting</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal behavior, Prediction of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal methods</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intelligence service</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Forecasting</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Psychological aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hollywood, John S.,</subfield><subfield code="d">1973-</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Out of the ordinary (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH4q6fX3XyBdmjcXCWX6JC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Out of the ordinary.</subfield><subfield code="z">0833035207</subfield><subfield code="w">(DLC) 2003023703</subfield><subfield code="w">(OCoLC)53356475</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bkg00011904</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">27.50</subfield><subfield code="d">20.63</subfield><subfield code="i">0833035207</subfield><subfield code="n">0004358101</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL236877</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">304908</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">outofordinaryfin0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3151681</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627606</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-ocm57032533 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:16:08Z |
institution | BVB |
isbn | 9780833048172 0833048171 9781598754131 1598754130 1282451227 9781282451223 |
language | English |
oclc_num | 57032533 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxx, 155 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | RAND Corp., |
record_format | marc |
spelling | Out of the ordinary : finding hidden threats by analyzing unusual behavior / John Hollywood [and others]. Santa Monica, Calif. : RAND Corp., 2004. 1 online resource (xxx, 155 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file "MG-126-RC." Includes bibliographical references (pages 151-155) and appendices. Title from title screen (viewed 11/23/2004). Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described. Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture. Criminal behavior, Prediction of United States. Crime forecasting United States. Criminal methods United States. Terrorism Forecasting. Terrorism Psychological aspects. Intelligence service United States. http://id.loc.gov/authorities/subjects/sh85067179 National security United States. http://id.loc.gov/authorities/subjects/sh85140387 Criminalité Prévision États-Unis. Modus operandi (Criminologie) États-Unis. Terrorisme Prévision. Terrorisme Aspect psychologique. POLITICAL SCIENCE Political Freedom & Security Law Enforcement. bisacsh POLITICAL SCIENCE Security (National & International) bisacsh Crime forecasting fast Criminal behavior, Prediction of fast Criminal methods fast Intelligence service fast National security fast Terrorism Forecasting fast Terrorism Psychological aspects fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Hollywood, John S., 1973- Rand Corporation. has work: Out of the ordinary (Text) https://id.oclc.org/worldcat/entity/E39PCH4q6fX3XyBdmjcXCWX6JC https://id.oclc.org/worldcat/ontology/hasWork Print version: Out of the ordinary. 0833035207 (DLC) 2003023703 (OCoLC)53356475 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908 Volltext |
spellingShingle | Out of the ordinary : finding hidden threats by analyzing unusual behavior / Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture. Criminal behavior, Prediction of United States. Crime forecasting United States. Criminal methods United States. Terrorism Forecasting. Terrorism Psychological aspects. Intelligence service United States. http://id.loc.gov/authorities/subjects/sh85067179 National security United States. http://id.loc.gov/authorities/subjects/sh85140387 Criminalité Prévision États-Unis. Modus operandi (Criminologie) États-Unis. Terrorisme Prévision. Terrorisme Aspect psychologique. POLITICAL SCIENCE Political Freedom & Security Law Enforcement. bisacsh POLITICAL SCIENCE Security (National & International) bisacsh Crime forecasting fast Criminal behavior, Prediction of fast Criminal methods fast Intelligence service fast National security fast Terrorism Forecasting fast Terrorism Psychological aspects fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85067179 http://id.loc.gov/authorities/subjects/sh85140387 |
title | Out of the ordinary : finding hidden threats by analyzing unusual behavior / |
title_auth | Out of the ordinary : finding hidden threats by analyzing unusual behavior / |
title_exact_search | Out of the ordinary : finding hidden threats by analyzing unusual behavior / |
title_full | Out of the ordinary : finding hidden threats by analyzing unusual behavior / John Hollywood [and others]. |
title_fullStr | Out of the ordinary : finding hidden threats by analyzing unusual behavior / John Hollywood [and others]. |
title_full_unstemmed | Out of the ordinary : finding hidden threats by analyzing unusual behavior / John Hollywood [and others]. |
title_short | Out of the ordinary : |
title_sort | out of the ordinary finding hidden threats by analyzing unusual behavior |
title_sub | finding hidden threats by analyzing unusual behavior / |
topic | Criminal behavior, Prediction of United States. Crime forecasting United States. Criminal methods United States. Terrorism Forecasting. Terrorism Psychological aspects. Intelligence service United States. http://id.loc.gov/authorities/subjects/sh85067179 National security United States. http://id.loc.gov/authorities/subjects/sh85140387 Criminalité Prévision États-Unis. Modus operandi (Criminologie) États-Unis. Terrorisme Prévision. Terrorisme Aspect psychologique. POLITICAL SCIENCE Political Freedom & Security Law Enforcement. bisacsh POLITICAL SCIENCE Security (National & International) bisacsh Crime forecasting fast Criminal behavior, Prediction of fast Criminal methods fast Intelligence service fast National security fast Terrorism Forecasting fast Terrorism Psychological aspects fast |
topic_facet | Criminal behavior, Prediction of United States. Crime forecasting United States. Criminal methods United States. Terrorism Forecasting. Terrorism Psychological aspects. Intelligence service United States. National security United States. Criminalité Prévision États-Unis. Modus operandi (Criminologie) États-Unis. Terrorisme Prévision. Terrorisme Aspect psychologique. POLITICAL SCIENCE Political Freedom & Security Law Enforcement. POLITICAL SCIENCE Security (National & International) Crime forecasting Criminal behavior, Prediction of Criminal methods Intelligence service National security Terrorism Forecasting Terrorism Psychological aspects United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=304908 |
work_keys_str_mv | AT hollywoodjohns outoftheordinaryfindinghiddenthreatsbyanalyzingunusualbehavior AT randcorporation outoftheordinaryfindinghiddenthreatsbyanalyzingunusualbehavior |