LEADER 05499nam 2200649 a 450 001 9910841070103321 005 20170809162023.0 010 $a1-280-65001-X 010 $a9786610650019 010 $a0-471-78656-X 010 $a0-471-78655-1 035 $a(CKB)1000000000354694 035 $a(EBL)272213 035 $a(SSID)ssj0000145860 035 $a(PQKBManifestationID)11162125 035 $a(PQKBTitleCode)TC0000145860 035 $a(PQKBWorkID)10182944 035 $a(PQKB)10939177 035 $a(MiAaPQ)EBC272213 035 $a(OCoLC)85784221 035 $a(PPN)242152058 035 $a(EXLCZ)991000000000354694 100 $a20061122d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aEmergent information technologies and enabling policies for counter-terrorism$b[electronic resource] /$fedited by Robert L. Popp, John Yen 210 $aHoboken, N.J. $cWiley-Interscience ;$aChichester $cJohn Wiley [distributor]$dc2006 215 $a1 online resource (486 p.) 225 1 $aIEEE series on computational intelligence 300 $aDescription based upon print version of record. 311 $a0-471-77615-7 320 $aIncludes bibliographical references and index. 327 $aUtilizing information and social science technology to understand and counter the twenty-first century strategic threat / Robert L. Popp, David Allen, and Claudio Cioffi-Revilla -- Hidden Markov models and Bayesian networks for counter-terrorism / Krishna Pattipati ... [et al.] -- Anticipatory models for counter-terrorism / Mark Lazaroff and David Snowden -- Information processing at very high speed data ingestion rates / J. Brian Sharkey ... [et al.] -- Analysis of heterogeneous data in ultrahigh dimensions / R.A. Ammar ... [et al.] -- Sematic web technologies for terrorist network analysis / Jennifer Golbeck, Aaron Mannes, and James Hendler -- Improving national and homeland security through context knowledge representation and reasoning technologies / Nazli Choucri, Stuart E. Madnick, and Michael D. Siegel -- Anonymized semantic directories and a privacy-enhancing architecture for enterprise discovery / Jeff Jonas and John Karat -- Facilitating information sharing across intelligence community boundaries using knowledge management and semantic web technologies / Brian Kettler, Gary Edwards, and Mark Hoffman -- Applying semantic web reasoning to counter-terrorism / Paul Kogut ... [et al.] -- Schemer : consensus-based knowledge validation and collaboration services for virtual teams of intelligence experts / Clifford Behrens, Hyong-Sop Shim, and Davaisis Bassu -- Sharing intelligence using information supply chains / Shuang Sun, Xiaocong Fan, and John Yen -- Supporting knowledge management in emergency crisis management domains : envisioned designs for collaborative work / Michael D. McNeese .. [et al.] -- Agent-based simulations for disaster rescue using the DEFACTO coordination system / Janusz Marecki, Nathan Schurr, and Milind Tambe -- Transcending the tower of Babel : supporting access to multilingual information with cross-language information retrieval / Douglas W. Oard -- Journey from analysis to inquiry : technology and transformation of counter-teorrorism analysis / Aaron B. Frank and Desmond Saunders-Newton -- Behavioral network analysis for terrorist detection / Seth A. Greenblatt, Thayne Coffman, and Sherry E. Marcus -- Detecting terrorist activities in the twenty-first century : a theory of detection for transactional networks / Tom Mifflin ... [et al.] -- Social network analysis via matrix decompositions / D.B. Skillicorn -- Legal standards for data mining / Fred H. Cate -- Privacy and consequences : legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty / Paul Rosenzweig -- Designing technical systems to support policy : enterprise architecture, policy appliances and civil liberties / K.A. Taipale. 330 $aExplores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, ""connecting the dots"" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. 410 0$aIEEE series on computational intelligence. 606 $aTerrorism$zUnited States$xPrevention 606 $aTerrorism$xGovernment policy$zUnited States 606 $aTerrorism$xTechnological innovations$zUnited States 606 $aInformation technology$xGovernment policy$zUnited States 615 0$aTerrorism$xPrevention. 615 0$aTerrorism$xGovernment policy 615 0$aTerrorism$xTechnological innovations 615 0$aInformation technology$xGovernment policy 676 $a363.3202854 676 $a363.3250285 701 $aPopp$b Robert L$01731459 701 $aYen$b John$0542474 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910841070103321 996 $aEmergent information technologies and enabling policies for counter-terrorism$94144170 997 $aUNINA