Cargando…

National security /

This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and inf...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Chen, Hsinchun
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Oxford : Elsevier, 2007.
Colección:Handbooks in information systems ; v. 2.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn164864207
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 070816s2007 ne a ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d N$T  |d OCLCQ  |d EBLCP  |d MERUC  |d UBY  |d E7B  |d OCLCQ  |d IDEBK  |d OCLCQ  |d MHW  |d OCLCQ  |d N$T  |d OCLCF  |d NLGGC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d AGLDB  |d OTZ  |d OCLCQ  |d VTS  |d XOS  |d OCLCQ  |d M8D  |d OCLCQ  |d VLY  |d UCW  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d UKAHL  |d OCLCQ  |d INARC  |d OCLCO 
015 |a GBA744429  |2 bnb 
016 7 |a 013662078  |2 Uk 
019 |a 212428000  |a 441806426  |a 648299397  |a 700706631  |a 994939356  |a 1064114125  |a 1162534674  |a 1196345477  |a 1300614805  |a 1392383986 
020 |a 9780080479613  |q (electronic bk.) 
020 |a 0080479618  |q (electronic bk.) 
020 |a 1281051039 
020 |a 9781281051035 
020 |a 9786611051037 
020 |a 6611051031 
020 |z 0444519963  |q (Cloth) 
020 |z 9780444519962  |q (hbk.) 
029 1 |a DEBBG  |b BV043087199 
029 1 |a DEBSZ  |b 422199354 
029 1 |a NLGGC  |b 304022454 
035 |a (OCoLC)164864207  |z (OCoLC)212428000  |z (OCoLC)441806426  |z (OCoLC)648299397  |z (OCoLC)700706631  |z (OCoLC)994939356  |z (OCoLC)1064114125  |z (OCoLC)1162534674  |z (OCoLC)1196345477  |z (OCoLC)1300614805  |z (OCoLC)1392383986 
050 4 |a QA76.9.A25  |b N275 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a National security /  |c edited by H. Chen [and others]. 
260 |a Amsterdam ;  |a Oxford :  |b Elsevier,  |c 2007. 
300 |a 1 online resource (xxii, 419 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Handbooks in information systems ;  |v v. 2 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of. 
588 0 |a Print version record. 
520 |a This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Expert systems (Computer science) 
650 0 |a Data mining. 
650 0 |a National security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Systèmes experts (Informatique) 
650 6 |a Exploration de données (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Data mining  |2 fast 
650 7 |a Expert systems (Computer science)  |2 fast 
650 7 |a National security  |2 fast 
700 1 |a Chen, Hsinchun. 
776 0 8 |i Print version:  |t National security.  |d Amsterdam ; Oxford : Elsevier, 2007  |z 9780444519962  |z 0444519963  |w (OCoLC)144548573 
830 0 |a Handbooks in information systems ;  |v v. 2. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196229  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23083646 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL648459 
938 |a ebrary  |b EBRY  |n ebr10185883 
938 |a EBSCOhost  |b EBSC  |n 196229 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 105103 
938 |a YBP Library Services  |b YANK  |n 2605662 
938 |a Internet Archive  |b INAR  |n nationalsecurity0002unse 
994 |a 92  |b IZTAP