Login
 
Main Data
Author: Christopher C. Yang, Michael Chiu-Lung Chau, Jau-Hwang Wang, Hsinchun Chen
Editor: Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen
Title: Security Informatics
Publisher: Springer-Verlag
ISBN/ISSN: 9781441913258
Edition: 1
Price: CHF 130.00
Publication date: 01/01/2010
Content
Category: Informatik, EDV Buch
Language: English
Technical Data
Pages: 206
Kopierschutz: DRM
Geräte: PC/MAC/eReader/Tablet
Formate: PDF
Table of contents

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.

SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Table of contents
Preface5
Contents7
Framing Social Movement Identity with Cyber-Artifacts:A Case Study of the International Falun Gong Movement8
1 Introduction9
2 Literature Review10
2.1 Social Movement Theory10
2.2 Social Movement Organizations and the Internet11
2.3 Cyber-Society Archaeology12
2.4 Social Network Analysis12
2.5 Writeprints14
3 Research Design: A Case Study of the International FLG Movement16
3.1 The Falun Gong Movement16
3.2 Research Design17
3.2.1 Cyber-Artifacts Collection17
3.2.2 Cyber-Artifact Analysis20
4 Research Results20
4.1 Link Analysis20
4.2 Web Content Analysis23
4.3 Forum Content Analysis23
4.3.1 Thread Topics23
4.3.2 Author Interaction27
5 Conclusions28
References29
Patterns of Word Use for Deception in Testimony31
1 Introduction31
2 Related Work32
2.1 The Pennebaker Model of Deception33
2.2 Including Correlation in the Pennebaker Model35
2.3 Interrogation35
3 A New Model of Deception36
4 Tuning the Model37
4.1 Normalization37
5 Experiment39
6 Results40
7 Conclusion44
References44
Information Integration for Terrorist or Criminal Social Networks46
1 Introduction47
2 Related Work50
3 A Framework of Information Sharing and Privacy Preservation for Integrating Social Networks53
4 Sub-graph Generalization54
5 Policy of Sharing55
6 Shared Information in a Generalized Node56
7 Computation with Shared Information57
8 Experiment61
9 Conclusion61
References61
Processing Constrained k -Closest Pairs Queries in Crime Databases63
1 Introduction64
2 Related Work66
3 Problem Description66
4 k -CCPQ Processi