National security /
This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and inf...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Oxford :
Elsevier,
2007.
|
Colección: | Handbooks in information systems ;
v. 2. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Copyright page
- Contents
- Preface
- Part I: Legal and Policy Frameworks
- Chapter 1. Should Commercial Misuse of Private Data be a Crime?
- 1. Introduction
- 2. The need for privacy in an era of ubiquitous information technology
- 3. Relation-based shared privacy
- 4. Criminal liability
- 5. Conclusion
- 6. Questions on the material
- 7. Questions for further research
- References
- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues
- 1. Introduction
- 2. National information technology security policies
- 3. Internationalization
- 4. Conclusion
- 5. Questions
- Acknowledgments
- References
- Chapter 3. Economics of Information Security Investment
- 1. Introduction
- 2. Characteristics of information security investment
- 3. Economics of information security investment
- 4. Management of information security investment
- 5. Conclusion
- 6. Questions for discussion
- Acknowledgement
- References
- Glossary of terms
- Part II: Intelligence and Security Informatics
- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications
- 1. The need: biometric access control
- 2. 2D methods
- 3. 3D methods
- 4. Biometric databases
- 5. Face recognition grand challenge (FRGC, 2005)
- 6. Future directions
- 7. Questions for classroom discussion
- Acknowledgments
- References
- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching
- 1. Introduction
- 2. Characteristics of biometrics
- 3. Fusion of results, the answer
- 4. Why traditional database queries do not work?
- 5. What is fuzzy matching?
- 6. Case study-border security
- 7. Conclusion
- 8. Questions for further research and debate
- Appendix-An overview of common biometrics
- Biography
- References
- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data
- 1. The threat of bioterrorism
- 2. Bioterrorism surveillance systems
- 3. Multidimensional data: sources of healthcare information
- 4. Timeliness: real-time information
- 5. Histories of indicator data: real-time data warehousing
- 6. Data analytics: algorithmic and exploratory pattern recognition
- 7. Summary and conclusions
- 8. Questions for discussion
- References
- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics
- 1. Introduction
- 2. Literature review
- 3. Support vector clustering-based spatio-temporal data analysis
- 4. Experimental studies
- 5. Case studies: public health surveillance and crime analysis
- 6. Conclusions and future work
- 7. Questions for Discussion
- Acknowledgment
- References
- Chapter 8. Deception and Intention Detection
- 1. Introduction
- 2. Deception, intentions, and behavior
- 3. Existing methods of deception detection
- 4. Application of methods in screening scenarios
- 5. Model for unobtrusive deception and intention detection
- 6. Automatic detection of.