Cargando…

Application of big data for national security : a practitioner's guide to emerging technologies /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Akhgar, Babak (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn903531520
003 OCoLC
005 20231120111941.0
006 m o d
007 cr cnu|||unuuu
008 150217s2015 mau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d N$T  |d UIU  |d E7B  |d TEFOD  |d OCLCF  |d YDXCP  |d VRC  |d DEBSZ  |d UMI  |d DEBBG  |d COO  |d TEFOD  |d REB  |d IDB  |d LIV  |d MERUC  |d NLE  |d VT2  |d OCLCA  |d KIJ  |d UUM  |d WRM  |d U3W  |d D6H  |d CEF  |d H9Z  |d OCLCQ  |d AU@  |d AUD  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d PWQ  |d OCLCQ 
019 |a 910165559  |a 1008952402  |a 1050537488  |a 1107459077 
020 |a 9780128019733  |q (electronic bk.) 
020 |a 0128019735  |q (electronic bk.) 
020 |a 0128019670 
020 |a 9780128019672 
020 |z 9780128019672 
035 |a (OCoLC)903531520  |z (OCoLC)910165559  |z (OCoLC)1008952402  |z (OCoLC)1050537488  |z (OCoLC)1107459077 
043 |a n-us--- 
050 4 |a UA23 
072 7 |a POL  |x 017000  |2 bisacsh 
082 0 4 |a 353.10973 
245 0 0 |a Application of big data for national security :  |b a practitioner's guide to emerging technologies /  |c edited by Babak Akhgar [and five others]. 
264 1 |a Oxford, UK :  |b Butterworth-Heinemann, an imprint of Elsevier Ltd.,  |c [2015] 
264 4 |c �2015 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical referencesa and index. 
588 0 |a Vendor-supplied metadata. 
520 8 |a Annotation  |b 'Mining Big Data to Improve National Security' introduces state-of-the-art concepts and technologies surrounding big data, providing users with a strategic framework that can be used to combat terrorism and reduce crime. 
505 0 |a Front Cover -- Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies -- Copyright -- Contents -- List of Contributors -- About the Editors -- Foreword by Lord Carlile of Berriew -- Preface by Edwin Meese III -- Acknowledgments -- Section 1 -- INTRODUCTION TO BIG DATA -- Chapter 1 -- An Introduction to Big Data -- WHAT IS BIG DATA? -- HOW DIFFERENT IS BIG DATA? -- MORE ON BIG DATA: TYPES AND SOURCES -- THE FIVE V'S OF BIG DATA -- BIG DATA IN THE BIG WORLD -- ANALYTICAL CAPABILITIES OF BIG DATA -- STREAMING ANALYTICS -- AN OVERVIEW OF BIG DATA SOLUTIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 2 -- DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALS -- INTRODUCTION -- THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS -- TECHNOLOGY CHALLENGES -- EXAMPLES -- CONCLUSION -- REFERENCE -- Section 2 -- CORE CONCEPTS AND APPLICATION SCENARIOS -- CHAPTER 3 -- HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM -- INTRODUCTION -- A NEW TERROR -- CHANGING THREAT LANDSCAPE -- EMBRACING BIG DATA -- CONCLUSION -- REFERENCES -- CHAPTER 4 -- BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY -- THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENT -- CASE EXAMPLE AND WORKSHOP OVERVIEW -- SITUATIONAL AWARENESS -- TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA -- SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP -- TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP -- LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS -- DISCUSSION -- ACKNOWLEDGMENTS -- REFERENCES -- CHAPTER 5 -- INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS -- INTRODUCTION -- IMPORTANCE OF THE CASE -- THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001 -- RELEVANT EVIDENCE. 
505 8 |a POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSIS -- POTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION -- FINAL WORDS: INTERPRETATION AND INSIDER THREAT -- REFERENCES -- CHAPTER 6 -- CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA -- INTRODUCTION -- UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED -- WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE? -- UNDERPINNING THE SCR -- STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 7 -- MILITARY AND BIG DATA REVOLUTION -- RISK OF COLLAPSE -- INTO THE BIG DATA ARENA -- SIMPLE TO COMPLEX USE CASES -- CANONIC USE CASES -- MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS) -- REAL-TIME BIG DATA SYSTEMS -- IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM -- INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS -- VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS -- CONCLUSIONS -- FURTHER READING -- CHAPTER 8 -- CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY -- INTRODUCTION -- DEFINING CYBERCRIME AND CYBERTERRORISM -- ATTACK CLASSIFICATION AND PARAMETERS -- WHO PERPETRATES THESE ATTACKS? -- TOOLS USED TO FACILITATE ATTACKS -- MOTIVATIONS -- ATTACK MOTIVATIONS TAXONOMY -- DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION -- CONCLUSION -- REFERENCES -- Section 3 -- METHODS AND TECHNOLOGICAL SOLUTIONS -- CHAPTER 9 -- REQUIREMENTS AND CHALLENGES FOR BIG DATA ARCHITECTURES -- WHAT ARE THE CHALLENGES INVOLVED IN BIG DATA PROCESSING? -- TECHNOLOGICAL UNDERPINNING -- PLANNING FOR A BIG DATA PLATFORM -- CONCLUSIONS -- REFERENCES -- CHAPTER 10 -- TOOLS AND TECHNOLOGIES FOR THE IMPLEMENTATION OF BIG DATA -- INTRODUCTION -- TECHNIQUES -- Analysis -- COMPUTATIONAL TOOLS -- IMPLEMENTATION -- PROJECT INITIATION AND LAUNCH -- DATA SOURCES AND ANALYTICS -- ANALYTICS PHILOSOPHY: ANALYSIS OR SYNTHESIS. 
505 8 |a GOVERNANCE AND COMPLIANCE -- REFERENCES -- CHAPTER 11 -- MINING SOCIAL MEDIA: ARCHITECTURE, TOOLS, AND APPROACHES TO DETECTING CRIMINAL ACTIVITY -- INTRODUCTION -- MINING OF SOCIAL NETWORKS FOR CRIME -- TEXT MINING -- NATURAL LANGUAGE METHODS -- GENERAL ARCHITECTURE AND VARIOUS COMPONENTS OF TEXT MINING -- AUTOMATIC EXTRACTION OF BNS FROM TEXT -- BNS AND CRIME DETECTION -- CONCLUSIONS -- REFERENCES -- CHAPTER 12 -- MAKING SENSE OF UNSTRUCTURED NATURAL LANGUAGE INFORMATION -- INTRODUCTION -- BIG DATA AND UNSTRUCTURED DATA -- ASPECTS OF UNCERTAINTY IN SENSE MAKING -- SITUATION AWARENESS AND INTELLIGENCE -- PROCESSING NATURAL LANGUAGE DATA -- STRUCTURING NATURAL LANGUAGE DATA -- TWO SIGNIFICANT WEAKNESSES -- AN ALTERNATIVE REPRESENTATION FOR FLEXIBILITY -- CONCLUSIONS -- REFERENCES -- CHAPTER 13 -- LITERATURE MINING AND ONTOLOGY MAPPING APPLIED TO BIG DATA -- INTRODUCTION -- BACKGROUND -- ARIANA: ADAPTIVE ROBUST INTEGRATIVE ANALYSIS FOR FINDING NOVEL ASSOCIATIONS -- CONCEPTUAL FRAMEWORK OF ARIANA -- IMPLEMENTATION OF ARIANA FOR BIOMEDICAL APPLICATIONS -- CASE STUDIES -- DISCUSSION -- CONCLUSIONS -- ACKNOWLEDGMENT -- REFERENCES -- CHAPTER 14 -- BIG DATA CONCERNS IN AUTONOMOUS AI SYSTEMS -- INTRODUCTION -- ARTIFICIALLY INTELLIGENT SYSTEM MEMORY MANAGEMENT -- ARTIFICIAL MEMORY PROCESSING AND ENCODING -- CONSTRUCTIVIST LEARNING -- PRACTICAL SOLUTIONS FOR SECURE KNOWLEDGE DEVELOPMENT IN BIG DATA ENVIRONMENTS -- CONCLUSIONS -- REFERENCES -- Section 4 -- LEGAL AND SOCIAL CHALLENGES -- CHAPTER 15 -- THE LEGAL CHALLENGES OF BIG DATA APPLICATION IN LAW ENFORCEMENT -- INTRODUCTION -- LEGAL FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 16 -- BIG DATA AND THE ITALIAN LEGAL FRAMEWORK: OPPORTUNITIES FOR POLICE FORCES -- INTRODUCTION -- EUROPEAN LEGAL FRAMEWORK -- THE ITALIAN LEGAL FRAMEWORK -- OPPORTUNITIES AND CONSTRAINTS FOR POLICE FORCES AND INTELLIGENCE -- REFERENCES. 
505 8 |a CHAPTER 17 -- ACCOUNTING FOR CULTURAL INFLUENCES IN BIG DATA ANALYTICS -- INTRODUCTION -- CONSIDERATIONS FROM CROSS-CULTURAL PSYCHOLOGY FOR BIG DATA ANALYTICS -- CULTURAL DEPENDENCE IN THE SUPPLY AND DEMAND SIDES OF BIG DATA ANALYTICS -- (MIS)MATCHES AMONG PRODUCER, PRODUCTION, INTERPRETER, AND INTERPRETATION CONTEXTS -- INTEGRATING CULTURAL INTELLIGENCE INTO BIG DATA ANALYTICS: SOME RECOMMENDATIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 18 -- MAKING SENSE OF THE NOISE: AN ABC APPROACH TO BIG DATA AND SECURITY -- HOW HUMANS NATURALLY DEAL WITH BIG DATA -- THE THREE STAGES OF DATA PROCESSING EXPLAINED -- THE PUBLIC ORDER POLICING MODEL AND THE COMMON OPERATIONAL PICTURE -- APPLICATIONS TO BIG DATA AND SECURITY -- APPLICATION TO BIG DATA AND NATIONAL SECURITY -- A FINAL CAVEAT FROM THE FBI BULLETIN -- REFERENCES -- Glossary -- Index. 
650 0 |a National security  |z United States. 
650 0 |a Big data. 
650 0 |a Data protection. 
650 0 |a Science and state. 
650 0 |a Technology and state. 
650 6 |a Donn�ees volumineuses.  |0 (CaQQLa)000284673 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 6 |a Politique scientifique et technique.  |0 (CaQQLa)201-0009888 
650 7 |a POLITICAL SCIENCE  |x Public Affairs & Administration.  |2 bisacsh 
650 7 |a Technology and state.  |2 fast  |0 (OCoLC)fst01145265 
650 7 |a Big data.  |2 fast  |0 (OCoLC)fst01892965 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a National security.  |2 fast  |0 (OCoLC)fst01033711 
650 7 |a Science and state.  |2 fast  |0 (OCoLC)fst01108536 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
655 4 |a Electronic books. 
700 1 |a Akhgar, Babak,  |e editor. 
776 0 8 |i Print version:  |t Application of big data for national security.  |d Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015]  |z 0128019670  |w (OCoLC)898052443 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128019672  |z Texto completo