Cargando…

National security /

This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and inf...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Chen, Hsinchun
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Oxford : Elsevier, 2007.
Colección:Handbooks in information systems ; v. 2.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Copyright page
  • Contents
  • Preface
  • Part I: Legal and Policy Frameworks
  • Chapter 1. Should Commercial Misuse of Private Data be a Crime?
  • 1. Introduction
  • 2. The need for privacy in an era of ubiquitous information technology
  • 3. Relation-based shared privacy
  • 4. Criminal liability
  • 5. Conclusion
  • 6. Questions on the material
  • 7. Questions for further research
  • References
  • Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues
  • 1. Introduction
  • 2. National information technology security policies
  • 3. Internationalization
  • 4. Conclusion
  • 5. Questions
  • Acknowledgments
  • References
  • Chapter 3. Economics of Information Security Investment
  • 1. Introduction
  • 2. Characteristics of information security investment
  • 3. Economics of information security investment
  • 4. Management of information security investment
  • 5. Conclusion
  • 6. Questions for discussion
  • Acknowledgement
  • References
  • Glossary of terms
  • Part II: Intelligence and Security Informatics
  • Chapter 4. State of 3D Face Biometrics for Homeland Security Applications
  • 1. The need: biometric access control
  • 2. 2D methods
  • 3. 3D methods
  • 4. Biometric databases
  • 5. Face recognition grand challenge (FRGC, 2005)
  • 6. Future directions
  • 7. Questions for classroom discussion
  • Acknowledgments
  • References
  • Chapter 5. The Necessity of Fuzzy Logic for Identity Matching
  • 1. Introduction
  • 2. Characteristics of biometrics
  • 3. Fusion of results, the answer
  • 4. Why traditional database queries do not work?
  • 5. What is fuzzy matching?
  • 6. Case study-border security
  • 7. Conclusion
  • 8. Questions for further research and debate
  • Appendix-An overview of common biometrics
  • Biography
  • References
  • Chapter 6. Managing Real-Time Bioterrorism Surveillance Data
  • 1. The threat of bioterrorism
  • 2. Bioterrorism surveillance systems
  • 3. Multidimensional data: sources of healthcare information
  • 4. Timeliness: real-time information
  • 5. Histories of indicator data: real-time data warehousing
  • 6. Data analytics: algorithmic and exploratory pattern recognition
  • 7. Summary and conclusions
  • 8. Questions for discussion
  • References
  • Chapter 7. Spatio-Temporal Data Analysis in Security Informatics
  • 1. Introduction
  • 2. Literature review
  • 3. Support vector clustering-based spatio-temporal data analysis
  • 4. Experimental studies
  • 5. Case studies: public health surveillance and crime analysis
  • 6. Conclusions and future work
  • 7. Questions for Discussion
  • Acknowledgment
  • References
  • Chapter 8. Deception and Intention Detection
  • 1. Introduction
  • 2. Deception, intentions, and behavior
  • 3. Existing methods of deception detection
  • 4. Application of methods in screening scenarios
  • 5. Model for unobtrusive deception and intention detection
  • 6. Automatic detection of.