Emergent Information Technologies and Enabling Policies for Counter-TerrorismRobert L. Popp, John Yen Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include:
Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers. |
Contents
1 | |
27 | |
Chapter 3 Anticipatory Models for CounterTerrorism | 51 |
Chapter 4 Information Processing at Very High Speed Data Ingestion Rates | 75 |
Chapter 5 Analysis of Heterogeneous Data in Ultrahigh Dimensions | 105 |
Chapter 6 Semantic Web Technologies for Terrorist Network Analysis | 125 |
Chapter 7 Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies | 139 |
Chapter 8 Anonymized Semantic Directories and a PrivacyEnhancing Architecture for Enterprise Discovery | 165 |
Chapter 14 AgentBased Simulations for Disaster Rescue Using the DEFACTO Coordination System | 281 |
Chapter 15 Transcending the Tower of Babel Supporting Access to Multilingual Information with CrossLanguage Information Retrieval | 299 |
Chapter 16 Journey from Analysis to Inquiry Technology and Transformation of CounterTerrorism Analysis | 315 |
Chapter 17 Behavioral Network Analysis for Terrorist Detection | 331 |
Chapter 18 Detecting Terrorist Activities in the TwentyFirst Century A Theory of Detection for Transactional Networks | 349 |
Chapter 19 Social Network Analysis Via Matrix Decompositions | 367 |
Chapter 20 Legal Standards for Data Mining | 393 |
Chapter 21 Privacy and Consequences Legal and Policy Structures for Implementing New CounterTerrorism Technologies and Protecting Civil Liberty | 421 |
Chapter 9 Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technolo... | 175 |
Chapter 10 Applying Semantic Web Reasoning to CounterTerrorism | 197 |
Chapter 11 Schemer ConsensusBased Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts | 209 |
Chapter 12 Sharing Intelligence Using Information Supply Chains | 231 |
Chapter 13 Supporting Knowledge Management In Emergency Crisis Management Domains Envisioned Designs for Collaborative Work | 255 |
Chapter 22 Designing Technical Systems to Support Policy Enterprise Architecture Policy Appliances and Civil Liberties | 439 |
Index | 459 |
About the Editors | 467 |
Other editions - View all
Emergent Information Technologies and Enabling Policies for Counter-Terrorism Robert L. Popp,John Yen No preview available - 2006 |