Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced significant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in significant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.
1112166858
Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced significant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in significant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.
54.99 In Stock
Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

Paperback(2003)

$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced significant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in significant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.

Product Details

ISBN-13: 9783540401896
Publisher: Springer Berlin Heidelberg
Publication date: 08/05/2003
Series: Lecture Notes in Computer Science , #2665
Edition description: 2003
Pages: 390
Product dimensions: 6.10(w) x 9.25(h) x 0.36(d)

Table of Contents

Full Papers.- Using Support Vector Machines for Terrorism Information Extraction.- Criminal Incident Data Association Using the OLAP Technology.- Names: A New Frontier in Text Mining.- Web-Based Intelligence Reports System.- Authorship Analysis in Cybercrime Investigation.- Behavior Profiling of Email.- Detecting Deception through Linguistic Analysis.- A Longitudinal Analysis of Language Behavior of Deception in E-mail.- Evacuation Planning: A Capacity Constrained Routing Approach.- Locating Hidden Groups in Communication Networks Using Hidden Markov Models.- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department.- Decision Based Spatial Analysis of Crime.- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis.- A Spatio Temporal Visualizer for Law Enforcement.- Tracking Hidden Groups Using Communications.- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study.- “Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age.- Untangling Criminal Networks: A Case Study.- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework.- Collaborative Workflow Management for Interagency Crime Analysis.- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement.- Active Database Systems for Monitoring and Surveillance.- Integrated “Mixed” Networks Security Monitoring — A Proposed Framework.- Bioterrorism Surveillance with Real-Time Data Warehousing.- Short Papers.- Privacy Sensitive Distributed Data Mining from Multi-party Data.- ProGenIE: Biographical Descriptions for Intelligence Analysis.- Scalable Knowledge Extraction from Legacy Sources with SEEK.-“TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features.- Emergent Semantics from Users’ Browsing Paths.- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection.- Training Professionals to Detect Deception.- An E-mail Monitoring System for Detecting Outflow of Confidential Documents.- Intelligence and Security Informatics: An Information Economics Perspective.- An International Perspective on Fighting Cybercrime.- Extended Abstracts for Posters.- Hiding Traversal of Tree Structured Data from Untrusted Data Stores.- Criminal Record Matching Based on the Vector Space Model.- Database Support for Exploring Criminal Networks.- Hiding Data and Code Security for Application Hosting Infrastructure.- Secure Information Sharing and Information Retrieval Infrastructure with GridIR.- Semantic Hacking and Intelligence and Security Informatics.
From the B&N Reads Blog

Customer Reviews