Emergent information technologies and enabling policies for counter-terrorism / (Record no. 42233)

000 -LEADER
fixed length control field 08547nam a2200973 i 4500
001 - CONTROL NUMBER
control field 5444075
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191218152119.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151221s2010 njuac ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470874103
Qualifying information electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0470874104
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780471776154
Qualifying information print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780471786559
Qualifying information electronic
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1109/9780470874103
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat05444075
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b000064812228cf
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6431
Item number .E487 2006eb
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6431 .E487 2006eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.3202854
Edition number 22
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.3250285
245 00 - TITLE STATEMENT
Title Emergent information technologies and enabling policies for counter-terrorism /
Statement of responsibility, etc. edited by Robert L. Popp, John Yen.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer Wiley-Interscience,
Date of production, publication, distribution, manufacture, or copyright notice c2006.
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [2010]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xv, 468 pages) :
Other physical details illustrations, port..
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement IEEE press series on computational intelligence ;
Volume/sequential designation 6
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Foreword -- Preface -- Contributors -- Chapter 1: Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1 (Robert L. Popp, David Allen, and Claudio Cioffi-Revilla) -- Chapter 2: Hidden Markov Models and Bayesian Networks for Counter-Terrorism (Krishna Pattipati, Peter Willett, Jeffrey Allanach, Haiying Tu, and Satnam Singh) -- Chapter 3: Anticipatory Models for Counter-Terrorism (Mark Lazaroff and David Snowden) -- Chapter 4: Information Processing at Very High Speed Data Ingestion Rates (J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna Pattipati, Stephen Eick, David Cousins, and Michael Nicoletti) -- Chapter 5: Analysis of Heterogeneous Data in Ultrahigh Dimensions (R. A. Ammar, S. A. Demurjian , Sr., I. R. Greenshields, Krishna Pattipati, and S. Rajasekaran) -- Chapter 6: Semantic Web Technologies for Terrorist Network Analysis (Jennifer Golbeck, Aaron Mannes, and James Hendler) -- Chapter 7: Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies (Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel) -- Chapter 8: Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery (Jeff Jonas and John Karat) -- Chapter 9: Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies (Brian Kettler, Gary Edwards, and Mark Hoffman) -- Chapter 10: Applying Semantic Web Reasoning to Counter-Terrorism (Paul Kogut, Yui Leung, Kathleen M. Ryan, Linda Gohari, Mieczyslaw M. Kotar, and Jerzy J. Letkowski) -- Chapter 11: Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts (Clifford Behrens, Hyong-Sop Shim, and Devaisis Bassu) -- Chapter 12: Sharing Intelligence Using Information Supply Chains (Shuang Sun, Xiaocong Fan, and John Yen) -- Chapter 13: Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work (Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, and Erik S. Connors).
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 14: Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System (Janusz Marecki, Nathan Schurr, and Milind Tambe) -- Chapter 15: Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval (Douglas W. Oard) -- Chapter 16: Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis (Aaron B. Frank and Desmond Saunders-Newton) -- Chapter 17: Behavioral Network Analysis for Terrorist Detection (Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus) -- Chapter 18: Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks (Tom Mifflin, Chris Boner, Greg Godfrey, and Michael Greenblatt) -- Chapter 19: Social Network Analysis Via Matrix Decompositions (D. B. Skillicorn) -- Chapter 20: Legal Standards for Data Mining (Fred H. Cate) -- Chapter 21: Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty (Paul Rosenzweig) -- Chapter 22: Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties (K. A. Taipale) -- Index -- About the Editors.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
520 ## - SUMMARY, ETC.
Summary, etc. Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: . Counter-terrorism modeling. Quantitative and computational social science. Signal processing and information management techniques. Semantic Web and knowledge management technologies. Information and intelligence sharing technologies. Text/data processing and language translation technologies. Social network analysis. Legal standards for data mining. Potential structures for enabling policies. Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/21/2015.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Terrorism
Geographic subdivision United States
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Terrorism
General subdivision Government policy
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Terrorism
General subdivision Technological innovations
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Government policy
Geographic subdivision United States.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
695 ## -
-- Artificial intelligence
695 ## -
-- Biographies
695 ## -
-- Biological system modeling
695 ## -
-- Browsers
695 ## -
-- Correlation
695 ## -
-- Databases
695 ## -
-- Decision making
695 ## -
-- Economic indicators
695 ## -
-- Eigenvalues and eigenfunctions
695 ## -
-- Equations
695 ## -
-- Google
695 ## -
-- Government
695 ## -
-- Heart rate variability
695 ## -
-- Heating
695 ## -
-- Hidden Markov models
695 ## -
-- Home appliances
695 ## -
-- Humans
695 ## -
-- Indexes
695 ## -
-- Indexing
695 ## -
-- Information filters
695 ## -
-- Knowledge based systems
695 ## -
-- Mathematical model
695 ## -
-- Noise
695 ## -
-- Production
695 ## -
-- Stochastic processes
695 ## -
-- Subscriptions
695 ## -
-- Terrorism
695 ## -
-- Testing
695 ## -
-- Variable speed drives
695 ## -
-- Visualization
695 ## -
-- Weapons
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yen, John.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Popp, Robert L.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element John Wiley & Sons,
Relator term publisher.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online service),
Relator term distributor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9780471776154
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE series on computational intelligence ;
Volume/sequential designation 6
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5444075

No items available.


International Institute of Information Technology, Bangalore
26/C, Electronics City, Hosur Road,Bengaluru-560100 Contact Us
Koha & OPAC at IIITB deployed by Bhargav Sridhar & Team.

Powered by Koha