Fr. 169.00

Intelligence Management - Knowledge Driven Frameworks for Combating Terrorism and Organized Crime

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. The chapters address the linkage between: law enforcement; developments in information and communication technologies and key ideas about the management of data, information, knowledge and intelligence. The work is conducted by a number of international academic and industrial research groups, law enforcement agencies, and end users.

Section 1 presents four chapters that address the details, outcomes, user needs and background theoretical ideas behind a large-scale research aand development project in this domain (The Odyssey Project). This project explored the challenges of establishing a Pan-European ballistics and crime information intelligence network. It represents an example of the type of system that is likely to become commonly used by Law Enforcement Agencies in the near future. Many of the challenges are not technical but organisational, legal, economic, social and political. Sections 2 and 3 therefore present wider commentaries. Section 2 explores other research and development projects that attempt to exploit the power of contemporary ICT systems to support Law Enforcement Agencies in many aspects of their work including investigations, data analysis and presentation, identification, training and crime prevention. Section 3 takes a look at the social and organisational issues around aspects of crime prevention, crime detection and policing - with a view to the role of information and communication technologies in thesecontexts.

List of contents

Introduction.-The Odyssey Project-Understanding and Implementing User Needs in the Context of Ballistic Crime Data Exchange.-Secure Architecture.-Interoperability-A Requirement for Tackling Gun Crime.-How Complexity Theory is Changing the Role of Analysis in Law Enforcement and National Security.-Technolgoies for Strategic Intelligence Management.-Data Management Techniques for Criminal Investigations.-Fast 3D Recognition for Forensicsc and Counter-Terrorism Applications.-Simulations for Crisis Management-PANDORA's Box.-Choices and Voices-A Serious Game for Preventing Violent Extremism.-Social, organisational and policy aspects of ICT and strategic intelligence management.-Strategic Intelligence Management for Combating Crime and Terrorism.-Human Trafficking-The Importance of Knowledge Information Exchange.-Cybercrime Profiling and Trend Analysis.-Up Close and Personal - The Interplay between Information Technology and Human Agency in the Policing of the 2011 Sheffield Anti-Lib Dem Protest.-Police Learning Strategies.-Conclusions - technolog, society and law enforcement agencies.

Summary

The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime.  The chapters address the linkage between: law enforcement; developments in information and communication technologies and key ideas about the management of data, information, knowledge and intelligence. The work is conducted by a number of international academic and industrial research groups, law enforcement agencies, and end users. 
 
Section 1 presents four chapters that address the details, outcomes, user needs and background theoretical ideas behind a large-scale research aand development project in this domain (The Odyssey Project).  This project explored the challenges of establishing a Pan-European ballistics and crime information intelligence network.  It represents an example of the type of system that is likely to become commonly used by Law Enforcement Agencies in the near future. Many of the challenges are not technical but organisational, legal, economic, social and political.  Sections 2 and 3 therefore present wider commentaries.  Section 2 explores other research and development projects that attempt to exploit the power of contemporary ICT systems to support Law Enforcement Agencies in many aspects of their work including investigations, data analysis and presentation, identification, training and crime prevention.  Section 3 takes a look at the social and organisational issues around aspects of crime prevention, crime detection and policing – with a view to the role of information and communication technologies in thesecontexts.

Additional text

From the reviews:
“In this excellent book, the editors have gleaned the best of international research on cyber crime. Such an offering has not happened by chance. The editors are specialists in the field of technology as utilized in law enforcement. … if you are a serious student of crime prevention, the book is a must read.” (James Van Speybroeck, ACM Computing Reviews, December, 2011)

Report

From the reviews:
"In this excellent book, the editors have gleaned the best of international research on cyber crime. Such an offering has not happened by chance. The editors are specialists in the field of technology as utilized in law enforcement. ... if you are a serious student of crime prevention, the book is a must read." (James Van Speybroeck, ACM Computing Reviews, December, 2011)

Product details

Assisted by Baba Akhgar (Editor), Babak Akhgar (Editor), Yates (Editor), Yates (Editor), Simeon Yates (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 11.09.2013
 
EAN 9781447126829
ISBN 978-1-4471-2682-9
No. of pages 232
Dimensions 159 mm x 235 mm x 15 mm
Weight 382 g
Illustrations XVI, 232 p.
Series Advanced Information and Knowledge Processing
Advanced Information and Knowledge Processing
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

B, Artificial Intelligence, computer science, Systems and Data Security, Data and Information Security, Network Security, Computer security, Information and Communication Technology

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.