CHF 189.00

Terrorism Informatics
Knowledge Management and Data Mining for Homeland Security

English · Hardback

Shipping usually within 6 to 7 weeks

Description

Read more

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and they involve the collection of a mass of information from multiple sources and in numerous languages.
 
TERRORISM INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches.

About the author

The lead author is an editor for the IEEE Int. conference on Intelligence and Security Informatics and the founder of ISI conferences.

Summary

This book surveys the state-of-the-art of terrorism informatics, It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. It first tackles methodological issues that impact trends, achievements, root causes, and failures in terrorism research within the context of the methods of retrieving and developing, sharing, and implementing methodologies and resources. The book next details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then goes into the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.

Additional text

From the reviews:
"The title of this book might imply, at first sight, a US-centric approach to the topic, but in fact, the contributions are not only from the US, but also from Canada … India, and Israel. … A particularly good feature of this book is the back matter included at the end of each chapter: suggested readings, online resources, and discussion questions … . This edited volume should appeal to the growing terrorism informatics research community, graduate students, and readers in the wider community … ." (John Fulcher, ACM Computing Reviews, May, 2009)

Report

From the reviews:

"The title of this book might imply, at first sight, a US-centric approach to the topic, but in fact, the contributions are not only from the US, but also from Canada ... India, and Israel. ... A particularly good feature of this book is the back matter included at the end of each chapter: suggested readings, online resources, and discussion questions ... . This edited volume should appeal to the growing terrorism informatics research community, graduate students, and readers in the wider community ... ." (John Fulcher, ACM Computing Reviews, May, 2009)

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.