213,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
payback
107 °P sammeln
  • Gebundenes Buch

This book provides an examination of key Twenty First-Century technologies and corresponding enabling policies for countering terrorism - it is critical to consider both technology and policy together since the two are strongly interdependent and realistic change will not occur without considering them jointly. The chapters are written by nationally-recognized highly-regarded authorities and experts on counter-terrorism information technologies and policy, providing a practical reference for those charged with protecting our nation from terrorist attacks while protecting our civil…mehr

Produktbeschreibung
This book provides an examination of key Twenty First-Century technologies and corresponding enabling policies for countering terrorism - it is critical to consider both technology and policy together since the two are strongly interdependent and realistic change will not occur without considering them jointly. The chapters are written by nationally-recognized highly-regarded authorities and experts on counter-terrorism information technologies and policy, providing a practical reference for those charged with protecting our nation from terrorist attacks while protecting our civil liberties.
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security

After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected.

Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties.

Topics covered include:
_ Counter-terrorism modeling
_ Quantitative and computational social science
_ Signal processing and information management techniques
_ Semantic Web and knowledge management technologies
_ Information and intelligence sharing technologies
_ Text/data processing and language translation technologies
_ Social network analysis
_ Legal standards for data mining
_ Potential structures for enabling policies
_ Technical system design to support policy

Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.
Autorenporträt
ROBERT L. POPP, PhD, is currently an Executive Vice President of Aptima, Inc., and formerly a senior executive within the Defense Department, serving in the Office of the Secretary of Defense and Defense Advanced Research Projects Agency (DARPA). He is an expert in national security and counter-terrorism, authoring numerous scientific papers and providing many technical briefings and interviews on the subject. He is a member of the Defense Science Board (DSB), Senior Associate for the Center for Strategic and International Studies (CSIS), Senior Member of the IEEE, member of ACM and AAAS, founding Fellow of the University of Connecticut Academy of Distinguished Engineers, and a lifetime member of HOG (the Harley Owners Group). JOHN YEN, PhD, is currently University Professor of Information Sciences and Technology and Professor in Charge, College of Information Sciences and Technology at The Pennsylvania State University. He is the author of numerous papers, holds one patent, chairs IEEE FIPA standard working groups on human agent communications, and is a member and Fellow of IEEE.