Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

National security [electronic resource] / edited by H. Chen ... [et al.].

Contributor(s): Chen, Hsinchun.
Material type: TextTextSeries: Handbooks in information systems: v. 2.Publisher: Amsterdam ; Oxford : Elsevier, 2007Description: 1 online resource (xxii, 419 p.) : ill.ISBN: 9780080479613 (electronic bk.); 0080479618 (electronic bk.).Subject(s): Computer networks -- Security measures | Expert systems (Computer science) | Data mining | National security | National security -- United States | Terrorism -- United States -- Prevention | Threats of violence | United States -- Military policy | Military Science | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- GeneralGenre/Form: Electronic books.Additional physical formats: Print version:: National security.DDC classification: 005.8 Online resources: EBSCOhost | EBSCOhost
Contents:
Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of.
Summary: This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

Cover -- Copyright page -- Contents -- Preface -- Part I: Legal and Policy Frameworks -- Chapter 1. Should Commercial Misuse of Private Data be a Crime? -- 1. Introduction -- 2. The need for privacy in an era of ubiquitous information technology -- 3. Relation-based shared privacy -- 4. Criminal liability -- 5. Conclusion -- 6. Questions on the material -- 7. Questions for further research -- References -- Chapter 2. National Information Technology (IT) Security Policies: An Overview of Issues -- 1. Introduction -- 2. National information technology security policies -- 3. Internationalization -- 4. Conclusion -- 5. Questions -- Acknowledgments -- References -- Chapter 3. Economics of Information Security Investment -- 1. Introduction -- 2. Characteristics of information security investment -- 3. Economics of information security investment -- 4. Management of information security investment -- 5. Conclusion -- 6. Questions for discussion -- Acknowledgement -- References -- Glossary of terms -- Part II: Intelligence and Security Informatics -- Chapter 4. State of 3D Face Biometrics for Homeland Security Applications -- 1. The need: biometric access control -- 2. 2D methods -- 3. 3D methods -- 4. Biometric databases -- 5. Face recognition grand challenge (FRGC, 2005) -- 6. Future directions -- 7. Questions for classroom discussion -- Acknowledgments -- References -- Chapter 5. The Necessity of Fuzzy Logic for Identity Matching -- 1. Introduction -- 2. Characteristics of biometrics -- 3. Fusion of results, the answer -- 4. Why traditional database queries do not work? -- 5. What is fuzzy matching? -- 6. Case study-border security -- 7. Conclusion -- 8. Questions for further research and debate -- Appendix-An overview of common biometrics -- Biography -- References -- Chapter 6. Managing Real-Time Bioterrorism Surveillance Data -- 1. The threat of bioterrorism -- 2. Bioterrorism surveillance systems -- 3. Multidimensional data: sources of healthcare information -- 4. Timeliness: real-time information -- 5. Histories of indicator data: real-time data warehousing -- 6. Data analytics: algorithmic and exploratory pattern recognition -- 7. Summary and conclusions -- 8. Questions for discussion -- References -- Chapter 7. Spatio-Temporal Data Analysis in Security Informatics -- 1. Introduction -- 2. Literature review -- 3. Support vector clustering-based spatio-temporal data analysis -- 4. Experimental studies -- 5. Case studies: public health surveillance and crime analysis -- 6. Conclusions and future work -- 7. Questions for Discussion -- Acknowledgment -- References -- Chapter 8. Deception and Intention Detection -- 1. Introduction -- 2. Deception, intentions, and behavior -- 3. Existing methods of deception detection -- 4. Application of methods in screening scenarios -- 5. Model for unobtrusive deception and intention detection -- 6. Automatic detection of.

Description based on print version record.

This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

National security ©2007
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter