Emergent Information Technologies and Enabling Policies for Counter-Terrorism

Emergent Information Technologies and Enabling Policies for Counter-Terrorism

Editor(s): Robert L. Popp, John Yen

Published Online: 7 OCT 2005

Print ISBN: 9780471776154

Online ISBN: 9780471786566

DOI: 10.1002/047178656X

About this Book

Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security

After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected.

Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties.

Topics covered include:

  • Counter-terrorism modeling
  • Quantitative and computational social science
  • Signal processing and information management techniques
  • Semantic Web and knowledge management technologies
  • Information and intelligence sharing technologies
  • Text/data processing and language translation technologies
  • Social network analysis
  • Legal standards for data mining
  • Potential structures for enabling policies
  • Technical system design to support policy

Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

Table of contents

    1. You have free access to this content
    2. Chapter 2

      Hidden Markov Models and Bayesian Networks for Counter-Terrorism (pages 27–50)

      Krishna Pattipati, Peter Willett, Jeffrey Allanach, Haiying Tu and Satnam Singh

    3. Chapter 4

      Information Processing at Very High Speed Data Ingestion Rates (pages 75–104)

      J. Brian Sharkey, D. Weishar, J. W. Lockwood, R. Loui, R. Rohwer, J. Byrnes, K. Pattipati, S. Eick, D. Cousins and M. Nicoletti

    4. Chapter 5

      Analysis of Heterogeneous Data in Ultrahigh Dimensions (pages 105–124)

      R. A. Ammar, S. A. Demurjian, I. R. Greenshields, K. Pattipati and S. Rajasekaran

    5. Chapter 10

      Applying Semantic Web Reasoning to Counter-Terrorism (pages 197–208)

      Paul Kogut, Yui Leung, Kathleen M. Ryan, Linda Gohari, Mieczyslaw M. Kotar and Jerzy J. Letkowski

    6. You have free access to this content
    7. You have free access to this content

SEARCH