Application of big data for national security : a practitioner's guide to emerging technologies /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Oxford, UK :
Butterworth-Heinemann, an imprint of Elsevier Ltd.,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover
- Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies
- Copyright
- Contents
- List of Contributors
- About the Editors
- Foreword by Lord Carlile of Berriew
- Preface by Edwin Meese III
- Acknowledgments
- Section 1
- INTRODUCTION TO BIG DATA
- Chapter 1
- An Introduction to Big Data
- WHAT IS BIG DATA?
- HOW DIFFERENT IS BIG DATA?
- MORE ON BIG DATA: TYPES AND SOURCES
- THE FIVE V'S OF BIG DATA
- BIG DATA IN THE BIG WORLD
- ANALYTICAL CAPABILITIES OF BIG DATA
- STREAMING ANALYTICS
- AN OVERVIEW OF BIG DATA SOLUTIONS
- CONCLUSIONS
- REFERENCES
- CHAPTER 2
- DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALS
- INTRODUCTION
- THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS
- TECHNOLOGY CHALLENGES
- EXAMPLES
- CONCLUSION
- REFERENCE
- Section 2
- CORE CONCEPTS AND APPLICATION SCENARIOS
- CHAPTER 3
- HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM
- INTRODUCTION
- A NEW TERROR
- CHANGING THREAT LANDSCAPE
- EMBRACING BIG DATA
- CONCLUSION
- REFERENCES
- CHAPTER 4
- BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY
- THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENT
- CASE EXAMPLE AND WORKSHOP OVERVIEW
- SITUATIONAL AWARENESS
- TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA
- SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP
- TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP
- LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS
- DISCUSSION
- ACKNOWLEDGMENTS
- REFERENCES
- CHAPTER 5
- INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS
- INTRODUCTION
- IMPORTANCE OF THE CASE
- THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001
- RELEVANT EVIDENCE.
- POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSIS
- POTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION
- FINAL WORDS: INTERPRETATION AND INSIDER THREAT
- REFERENCES
- CHAPTER 6
- CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA
- INTRODUCTION
- UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED
- WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE?
- UNDERPINNING THE SCR
- STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK
- CONCLUSIONS
- REFERENCES
- CHAPTER 7
- MILITARY AND BIG DATA REVOLUTION
- RISK OF COLLAPSE
- INTO THE BIG DATA ARENA
- SIMPLE TO COMPLEX USE CASES
- CANONIC USE CASES
- MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS)
- REAL-TIME BIG DATA SYSTEMS
- IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM
- INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS
- VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS
- CONCLUSIONS
- FURTHER READING
- CHAPTER 8
- CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY
- INTRODUCTION
- DEFINING CYBERCRIME AND CYBERTERRORISM
- ATTACK CLASSIFICATION AND PARAMETERS
- WHO PERPETRATES THESE ATTACKS?
- TOOLS USED TO FACILITATE ATTACKS
- MOTIVATIONS
- ATTACK MOTIVATIONS TAXONOMY
- DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION
- CONCLUSION
- REFERENCES
- Section 3
- METHODS AND TECHNOLOGICAL SOLUTIONS
- CHAPTER 9
- REQUIREMENTS AND CHALLENGES FOR BIG DATA ARCHITECTURES
- WHAT ARE THE CHALLENGES INVOLVED IN BIG DATA PROCESSING?
- TECHNOLOGICAL UNDERPINNING
- PLANNING FOR A BIG DATA PLATFORM
- CONCLUSIONS
- REFERENCES
- CHAPTER 10
- TOOLS AND TECHNOLOGIES FOR THE IMPLEMENTATION OF BIG DATA
- INTRODUCTION
- TECHNIQUES
- Analysis
- COMPUTATIONAL TOOLS
- IMPLEMENTATION
- PROJECT INITIATION AND LAUNCH
- DATA SOURCES AND ANALYTICS
- ANALYTICS PHILOSOPHY: ANALYSIS OR SYNTHESIS.
- GOVERNANCE AND COMPLIANCE
- REFERENCES
- CHAPTER 11
- MINING SOCIAL MEDIA: ARCHITECTURE, TOOLS, AND APPROACHES TO DETECTING CRIMINAL ACTIVITY
- INTRODUCTION
- MINING OF SOCIAL NETWORKS FOR CRIME
- TEXT MINING
- NATURAL LANGUAGE METHODS
- GENERAL ARCHITECTURE AND VARIOUS COMPONENTS OF TEXT MINING
- AUTOMATIC EXTRACTION OF BNS FROM TEXT
- BNS AND CRIME DETECTION
- CONCLUSIONS
- REFERENCES
- CHAPTER 12
- MAKING SENSE OF UNSTRUCTURED NATURAL LANGUAGE INFORMATION
- INTRODUCTION
- BIG DATA AND UNSTRUCTURED DATA
- ASPECTS OF UNCERTAINTY IN SENSE MAKING
- SITUATION AWARENESS AND INTELLIGENCE
- PROCESSING NATURAL LANGUAGE DATA
- STRUCTURING NATURAL LANGUAGE DATA
- TWO SIGNIFICANT WEAKNESSES
- AN ALTERNATIVE REPRESENTATION FOR FLEXIBILITY
- CONCLUSIONS
- REFERENCES
- CHAPTER 13
- LITERATURE MINING AND ONTOLOGY MAPPING APPLIED TO BIG DATA
- INTRODUCTION
- BACKGROUND
- ARIANA: ADAPTIVE ROBUST INTEGRATIVE ANALYSIS FOR FINDING NOVEL ASSOCIATIONS
- CONCEPTUAL FRAMEWORK OF ARIANA
- IMPLEMENTATION OF ARIANA FOR BIOMEDICAL APPLICATIONS
- CASE STUDIES
- DISCUSSION
- CONCLUSIONS
- ACKNOWLEDGMENT
- REFERENCES
- CHAPTER 14
- BIG DATA CONCERNS IN AUTONOMOUS AI SYSTEMS
- INTRODUCTION
- ARTIFICIALLY INTELLIGENT SYSTEM MEMORY MANAGEMENT
- ARTIFICIAL MEMORY PROCESSING AND ENCODING
- CONSTRUCTIVIST LEARNING
- PRACTICAL SOLUTIONS FOR SECURE KNOWLEDGE DEVELOPMENT IN BIG DATA ENVIRONMENTS
- CONCLUSIONS
- REFERENCES
- Section 4
- LEGAL AND SOCIAL CHALLENGES
- CHAPTER 15
- THE LEGAL CHALLENGES OF BIG DATA APPLICATION IN LAW ENFORCEMENT
- INTRODUCTION
- LEGAL FRAMEWORK
- CONCLUSIONS
- REFERENCES
- CHAPTER 16
- BIG DATA AND THE ITALIAN LEGAL FRAMEWORK: OPPORTUNITIES FOR POLICE FORCES
- INTRODUCTION
- EUROPEAN LEGAL FRAMEWORK
- THE ITALIAN LEGAL FRAMEWORK
- OPPORTUNITIES AND CONSTRAINTS FOR POLICE FORCES AND INTELLIGENCE
- REFERENCES.
- CHAPTER 17
- ACCOUNTING FOR CULTURAL INFLUENCES IN BIG DATA ANALYTICS
- INTRODUCTION
- CONSIDERATIONS FROM CROSS-CULTURAL PSYCHOLOGY FOR BIG DATA ANALYTICS
- CULTURAL DEPENDENCE IN THE SUPPLY AND DEMAND SIDES OF BIG DATA ANALYTICS
- (MIS)MATCHES AMONG PRODUCER, PRODUCTION, INTERPRETER, AND INTERPRETATION CONTEXTS
- INTEGRATING CULTURAL INTELLIGENCE INTO BIG DATA ANALYTICS: SOME RECOMMENDATIONS
- CONCLUSIONS
- REFERENCES
- CHAPTER 18
- MAKING SENSE OF THE NOISE: AN ABC APPROACH TO BIG DATA AND SECURITY
- HOW HUMANS NATURALLY DEAL WITH BIG DATA
- THE THREE STAGES OF DATA PROCESSING EXPLAINED
- THE PUBLIC ORDER POLICING MODEL AND THE COMMON OPERATIONAL PICTURE
- APPLICATIONS TO BIG DATA AND SECURITY
- APPLICATION TO BIG DATA AND NATIONAL SECURITY
- A FINAL CAVEAT FROM THE FBI BULLETIN
- REFERENCES
- Glossary
- Index.