Cargando…

Application of big data for national security : a practitioner's guide to emerging technologies /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Akhgar, Babak (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover
  • Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies
  • Copyright
  • Contents
  • List of Contributors
  • About the Editors
  • Foreword by Lord Carlile of Berriew
  • Preface by Edwin Meese III
  • Acknowledgments
  • Section 1
  • INTRODUCTION TO BIG DATA
  • Chapter 1
  • An Introduction to Big Data
  • WHAT IS BIG DATA?
  • HOW DIFFERENT IS BIG DATA?
  • MORE ON BIG DATA: TYPES AND SOURCES
  • THE FIVE V'S OF BIG DATA
  • BIG DATA IN THE BIG WORLD
  • ANALYTICAL CAPABILITIES OF BIG DATA
  • STREAMING ANALYTICS
  • AN OVERVIEW OF BIG DATA SOLUTIONS
  • CONCLUSIONS
  • REFERENCES
  • CHAPTER 2
  • DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALS
  • INTRODUCTION
  • THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS
  • TECHNOLOGY CHALLENGES
  • EXAMPLES
  • CONCLUSION
  • REFERENCE
  • Section 2
  • CORE CONCEPTS AND APPLICATION SCENARIOS
  • CHAPTER 3
  • HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM
  • INTRODUCTION
  • A NEW TERROR
  • CHANGING THREAT LANDSCAPE
  • EMBRACING BIG DATA
  • CONCLUSION
  • REFERENCES
  • CHAPTER 4
  • BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY
  • THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENT
  • CASE EXAMPLE AND WORKSHOP OVERVIEW
  • SITUATIONAL AWARENESS
  • TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA
  • SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP
  • TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP
  • LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS
  • DISCUSSION
  • ACKNOWLEDGMENTS
  • REFERENCES
  • CHAPTER 5
  • INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS
  • INTRODUCTION
  • IMPORTANCE OF THE CASE
  • THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001
  • RELEVANT EVIDENCE.
  • POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSIS
  • POTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION
  • FINAL WORDS: INTERPRETATION AND INSIDER THREAT
  • REFERENCES
  • CHAPTER 6
  • CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA
  • INTRODUCTION
  • UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED
  • WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE?
  • UNDERPINNING THE SCR
  • STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK
  • CONCLUSIONS
  • REFERENCES
  • CHAPTER 7
  • MILITARY AND BIG DATA REVOLUTION
  • RISK OF COLLAPSE
  • INTO THE BIG DATA ARENA
  • SIMPLE TO COMPLEX USE CASES
  • CANONIC USE CASES
  • MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS)
  • REAL-TIME BIG DATA SYSTEMS
  • IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM
  • INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS
  • VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS
  • CONCLUSIONS
  • FURTHER READING
  • CHAPTER 8
  • CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY
  • INTRODUCTION
  • DEFINING CYBERCRIME AND CYBERTERRORISM
  • ATTACK CLASSIFICATION AND PARAMETERS
  • WHO PERPETRATES THESE ATTACKS?
  • TOOLS USED TO FACILITATE ATTACKS
  • MOTIVATIONS
  • ATTACK MOTIVATIONS TAXONOMY
  • DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION
  • CONCLUSION
  • REFERENCES
  • Section 3
  • METHODS AND TECHNOLOGICAL SOLUTIONS
  • CHAPTER 9
  • REQUIREMENTS AND CHALLENGES FOR BIG DATA ARCHITECTURES
  • WHAT ARE THE CHALLENGES INVOLVED IN BIG DATA PROCESSING?
  • TECHNOLOGICAL UNDERPINNING
  • PLANNING FOR A BIG DATA PLATFORM
  • CONCLUSIONS
  • REFERENCES
  • CHAPTER 10
  • TOOLS AND TECHNOLOGIES FOR THE IMPLEMENTATION OF BIG DATA
  • INTRODUCTION
  • TECHNIQUES
  • Analysis
  • COMPUTATIONAL TOOLS
  • IMPLEMENTATION
  • PROJECT INITIATION AND LAUNCH
  • DATA SOURCES AND ANALYTICS
  • ANALYTICS PHILOSOPHY: ANALYSIS OR SYNTHESIS.
  • GOVERNANCE AND COMPLIANCE
  • REFERENCES
  • CHAPTER 11
  • MINING SOCIAL MEDIA: ARCHITECTURE, TOOLS, AND APPROACHES TO DETECTING CRIMINAL ACTIVITY
  • INTRODUCTION
  • MINING OF SOCIAL NETWORKS FOR CRIME
  • TEXT MINING
  • NATURAL LANGUAGE METHODS
  • GENERAL ARCHITECTURE AND VARIOUS COMPONENTS OF TEXT MINING
  • AUTOMATIC EXTRACTION OF BNS FROM TEXT
  • BNS AND CRIME DETECTION
  • CONCLUSIONS
  • REFERENCES
  • CHAPTER 12
  • MAKING SENSE OF UNSTRUCTURED NATURAL LANGUAGE INFORMATION
  • INTRODUCTION
  • BIG DATA AND UNSTRUCTURED DATA
  • ASPECTS OF UNCERTAINTY IN SENSE MAKING
  • SITUATION AWARENESS AND INTELLIGENCE
  • PROCESSING NATURAL LANGUAGE DATA
  • STRUCTURING NATURAL LANGUAGE DATA
  • TWO SIGNIFICANT WEAKNESSES
  • AN ALTERNATIVE REPRESENTATION FOR FLEXIBILITY
  • CONCLUSIONS
  • REFERENCES
  • CHAPTER 13
  • LITERATURE MINING AND ONTOLOGY MAPPING APPLIED TO BIG DATA
  • INTRODUCTION
  • BACKGROUND
  • ARIANA: ADAPTIVE ROBUST INTEGRATIVE ANALYSIS FOR FINDING NOVEL ASSOCIATIONS
  • CONCEPTUAL FRAMEWORK OF ARIANA
  • IMPLEMENTATION OF ARIANA FOR BIOMEDICAL APPLICATIONS
  • CASE STUDIES
  • DISCUSSION
  • CONCLUSIONS
  • ACKNOWLEDGMENT
  • REFERENCES
  • CHAPTER 14
  • BIG DATA CONCERNS IN AUTONOMOUS AI SYSTEMS
  • INTRODUCTION
  • ARTIFICIALLY INTELLIGENT SYSTEM MEMORY MANAGEMENT
  • ARTIFICIAL MEMORY PROCESSING AND ENCODING
  • CONSTRUCTIVIST LEARNING
  • PRACTICAL SOLUTIONS FOR SECURE KNOWLEDGE DEVELOPMENT IN BIG DATA ENVIRONMENTS
  • CONCLUSIONS
  • REFERENCES
  • Section 4
  • LEGAL AND SOCIAL CHALLENGES
  • CHAPTER 15
  • THE LEGAL CHALLENGES OF BIG DATA APPLICATION IN LAW ENFORCEMENT
  • INTRODUCTION
  • LEGAL FRAMEWORK
  • CONCLUSIONS
  • REFERENCES
  • CHAPTER 16
  • BIG DATA AND THE ITALIAN LEGAL FRAMEWORK: OPPORTUNITIES FOR POLICE FORCES
  • INTRODUCTION
  • EUROPEAN LEGAL FRAMEWORK
  • THE ITALIAN LEGAL FRAMEWORK
  • OPPORTUNITIES AND CONSTRAINTS FOR POLICE FORCES AND INTELLIGENCE
  • REFERENCES.
  • CHAPTER 17
  • ACCOUNTING FOR CULTURAL INFLUENCES IN BIG DATA ANALYTICS
  • INTRODUCTION
  • CONSIDERATIONS FROM CROSS-CULTURAL PSYCHOLOGY FOR BIG DATA ANALYTICS
  • CULTURAL DEPENDENCE IN THE SUPPLY AND DEMAND SIDES OF BIG DATA ANALYTICS
  • (MIS)MATCHES AMONG PRODUCER, PRODUCTION, INTERPRETER, AND INTERPRETATION CONTEXTS
  • INTEGRATING CULTURAL INTELLIGENCE INTO BIG DATA ANALYTICS: SOME RECOMMENDATIONS
  • CONCLUSIONS
  • REFERENCES
  • CHAPTER 18
  • MAKING SENSE OF THE NOISE: AN ABC APPROACH TO BIG DATA AND SECURITY
  • HOW HUMANS NATURALLY DEAL WITH BIG DATA
  • THE THREE STAGES OF DATA PROCESSING EXPLAINED
  • THE PUBLIC ORDER POLICING MODEL AND THE COMMON OPERATIONAL PICTURE
  • APPLICATIONS TO BIG DATA AND SECURITY
  • APPLICATION TO BIG DATA AND NATIONAL SECURITY
  • A FINAL CAVEAT FROM THE FBI BULLETIN
  • REFERENCES
  • Glossary
  • Index.