Autor: Christopher C. Yang, Michael Chiu-Lung Chau, Jau-Hwang Wang, Hsinchun Chen
Herausgeber: Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen
Titel: Security Informatics
Verlag: Springer-Verlag
ISBN/ISSN: 9781441913258
Auflage: 1
Preis : CHF 134.60
Kategorie: Informatik, EDV Buch
Sprache: English
Technische Daten
Seiten: 206
Kopierschutz: DRM
Geräte: PC/MAC/eReader/Tablet
Formate: PDF

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.

SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Framing Social Movement Identity with Cyber-Artifacts:A Case Study of the International Falun Gong Movement8
1 Introduction9
2 Literature Review10
2.1 Social Movement Theory10
2.2 Social Movement Organizations and the Internet11
2.3 Cyber-Society Archaeology12
2.4 Social Network Analysis12
2.5 Writeprints14
3 Research Design: A Case Study of the International FLG Movement16
3.1 The Falun Gong Movement16
3.2 Research Design17
3.2.1 Cyber-Artifacts Collection17
3.2.2 Cyber-Artifact Analysis20
4 Research Results20
4.1 Link Analysis20
4.2 Web Content Analysis23
4.3 Forum Content Analysis23
4.3.1 Thread Topics23
4.3.2 Author Interaction27
5 Conclusions28
Patterns of Word Use for Deception in Testimony31
1 Introduction31
2 Related Work32
2.1 The Pennebaker Model of Deception33
2.2 Including Correlation in the Pennebaker Model35
2.3 Interrogation35
3 A New Model of Deception36
4 Tuning the Model37
4.1 Normalization37
5 Experiment39
6 Results40
7 Conclusion44
Information Integration for Terrorist or Criminal Social Networks46
1 Introduction47
2 Related Work50
3 A Framework of Information Sharing and Privacy Preservation for Integrating Social Networks53
4 Sub-graph Generalization54
5 Policy of Sharing55
6 Shared Information in a Generalized Node56
7 Computation with Shared Information57
8 Experiment61
9 Conclusion61
Processing Constrained k -Closest Pairs Queries in Crime Databases63
1 Introduction64
2 Related Work66
3 Problem Description66
4 k -CCPQ Processi