Intelligence and Security Informatics [electronic resource] : First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings / edited by Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Jenny Schroeder, Therani Madhusudan.

Contributor(s): Chen, Hsinchun [editor.] | Miranda, Richard [editor.] | Zeng, Daniel D [editor.] | Demchak, Chris [editor.] | Schroeder, Jenny [editor.] | Madhusudan, Therani [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 2665Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003Description: XIV, 390 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540448532Subject(s): Computer science | Computer Communication Networks | Database management | Information storage and retrieval systems | Information systems | Artificial intelligence | Computers -- Law and legislation | Computer Science | Information Systems Applications (incl.Internet) | Computer Communication Networks | Database Management | Information Storage and Retrieval | Artificial Intelligence (incl. Robotics) | Legal Aspects of ComputingAdditional physical formats: Printed edition:: No titleDDC classification: 005.7 LOC classification: QA76.76.A65Online resources: Click here to access online
Contents:
Full Papers -- Using Support Vector Machines for Terrorism Information Extraction -- Criminal Incident Data Association Using the OLAP Technology -- Names: A New Frontier in Text Mining -- Web-Based Intelligence Reports System -- Authorship Analysis in Cybercrime Investigation -- Behavior Profiling of Email -- Detecting Deception through Linguistic Analysis -- A Longitudinal Analysis of Language Behavior of Deception in E-mail -- Evacuation Planning: A Capacity Constrained Routing Approach -- Locating Hidden Groups in Communication Networks Using Hidden Markov Models -- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department -- Decision Based Spatial Analysis of Crime -- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis -- A Spatio Temporal Visualizer for Law Enforcement -- Tracking Hidden Groups Using Communications -- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study -- “Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling Criminal Networks: A Case Study -- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework -- Collaborative Workflow Management for Interagency Crime Analysis -- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement -- Active Database Systems for Monitoring and Surveillance -- Integrated “Mixed” Networks Security Monitoring — A Proposed Framework -- Bioterrorism Surveillance with Real-Time Data Warehousing -- Short Papers -- Privacy Sensitive Distributed Data Mining from Multi-party Data -- ProGenIE: Biographical Descriptions for Intelligence Analysis -- Scalable Knowledge Extraction from Legacy Sources with SEEK -- “TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features -- Emergent Semantics from Users’ Browsing Paths -- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection -- Training Professionals to Detect Deception -- An E-mail Monitoring System for Detecting Outflow of Confidential Documents -- Intelligence and Security Informatics: An Information Economics Perspective -- An International Perspective on Fighting Cybercrime -- Extended Abstracts for Posters -- Hiding Traversal of Tree Structured Data from Untrusted Data Stores -- Criminal Record Matching Based on the Vector Space Model -- Database Support for Exploring Criminal Networks -- Hiding Data and Code Security for Application Hosting Infrastructure -- Secure Information Sharing and Information Retrieval Infrastructure with GridIR -- Semantic Hacking and Intelligence and Security Informatics.
In: Springer eBooksSummary: Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK5045

Full Papers -- Using Support Vector Machines for Terrorism Information Extraction -- Criminal Incident Data Association Using the OLAP Technology -- Names: A New Frontier in Text Mining -- Web-Based Intelligence Reports System -- Authorship Analysis in Cybercrime Investigation -- Behavior Profiling of Email -- Detecting Deception through Linguistic Analysis -- A Longitudinal Analysis of Language Behavior of Deception in E-mail -- Evacuation Planning: A Capacity Constrained Routing Approach -- Locating Hidden Groups in Communication Networks Using Hidden Markov Models -- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department -- Decision Based Spatial Analysis of Crime -- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis -- A Spatio Temporal Visualizer for Law Enforcement -- Tracking Hidden Groups Using Communications -- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study -- “Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling Criminal Networks: A Case Study -- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework -- Collaborative Workflow Management for Interagency Crime Analysis -- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement -- Active Database Systems for Monitoring and Surveillance -- Integrated “Mixed” Networks Security Monitoring — A Proposed Framework -- Bioterrorism Surveillance with Real-Time Data Warehousing -- Short Papers -- Privacy Sensitive Distributed Data Mining from Multi-party Data -- ProGenIE: Biographical Descriptions for Intelligence Analysis -- Scalable Knowledge Extraction from Legacy Sources with SEEK -- “TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features -- Emergent Semantics from Users’ Browsing Paths -- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection -- Training Professionals to Detect Deception -- An E-mail Monitoring System for Detecting Outflow of Confidential Documents -- Intelligence and Security Informatics: An Information Economics Perspective -- An International Perspective on Fighting Cybercrime -- Extended Abstracts for Posters -- Hiding Traversal of Tree Structured Data from Untrusted Data Stores -- Criminal Record Matching Based on the Vector Space Model -- Database Support for Exploring Criminal Networks -- Hiding Data and Code Security for Application Hosting Infrastructure -- Secure Information Sharing and Information Retrieval Infrastructure with GridIR -- Semantic Hacking and Intelligence and Security Informatics.

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha