Emergent information technologies and enabling policies for counter-terrorism /

Saved in:
Bibliographic Details
Imprint:Hoboken, N.J. : Wiley-Interscience ; Chichester : John Wiley [distributor], c2006.
Description:1 online resource (xv, 468 p.) : ill., port.
Language:English
Series:IEEE Press series on computational intelligence
IEEE series on computational intelligence.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/8680084
Hidden Bibliographic Details
Other authors / contributors:Popp, Robert L.
Yen, John.
ISBN:047178656X
9780471786566
0471786551 (electronic bk.)
9780471786559 (electronic bk.)
9780470874103
0470874104
0471776157
9780471776154
Notes:Includes bibliographical references and index.
Summary:Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national securityAfter the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks.
Other form:Print version: Emergent information technologies and enabling policies for counter-terrorism. Hoboken, N.J. : Wiley-Interscience ; Chichester : John Wiley [distributor], c2006 0471776157 9780471776154
Standard no.:10.1002/047178656X
Description
Summary:Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security <p>After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected.</p> <p>Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties.</p> <p> Topics covered include: </p> Counter-terrorism modeling Quantitative and computational social science Signal processing and information management techniques Semantic Web and knowledge management technologies Information and intelligence sharing technologies Text/data processing and language translation technologies Social network analysis Legal standards for data mining Potential structures for enabling policies Technical system design to support policy <p>Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.</p>
Physical Description:1 online resource (xv, 468 p.) : ill., port.
Bibliography:Includes bibliographical references and index.
ISBN:047178656X
9780471786566
0471786551
9780471786559
9780470874103
0470874104
0471776157
9780471776154