Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book

Title National security / edited by H. Chen [and others].

Publication Info. Amsterdam ; Oxford : Elsevier, 2007.

Item Status

Description 1 online resource (xxii, 419 pages) : illustrations.
Physical Medium polychrome
Description text file
Series Handbooks in information systems ; v. 2
Handbooks in information systems ; v. 2.
Bibliography Includes bibliographical references and index.
Contents Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of.
Summary This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Computer networks -- Security measures.
Computer networks -- Security measures.
Expert systems (Computer science)
Expert systems (Computer science)
Data mining.
Data mining.
National security.
National security.
Genre/Form Electronic books.
Added Author Chen, Hsinchun.
Other Form: Print version: National security. Amsterdam ; Oxford : Elsevier, 2007 9780444519962 0444519963 (OCoLC)144548573
ISBN 9780080479613 (electronic book)
0080479618 (electronic book)
0444519963 (Cloth)
9780444519962 (hardback)