Limit search to available items
Book Cover
E-book

Title Application of big data for national security : a practitioner's guide to emerging technologies / edited by Babak Akhgar [and five others]
Published Oxford, UK : Butterworth-Heinemann, an imprint of Elsevier Ltd., [2015]
©2015

Copies

Description 1 online resource
Contents Front Cover -- Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies -- Copyright -- Contents -- List of Contributors -- About the Editors -- Foreword by Lord Carlile of Berriew -- Preface by Edwin Meese III -- Acknowledgments -- Section 1 -- INTRODUCTION TO BIG DATA -- Chapter 1 -- An Introduction to Big Data -- WHAT IS BIG DATA? -- HOW DIFFERENT IS BIG DATA? -- MORE ON BIG DATA: TYPES AND SOURCES -- THE FIVE V'S OF BIG DATA -- BIG DATA IN THE BIG WORLD -- ANALYTICAL CAPABILITIES OF BIG DATA -- STREAMING ANALYTICS -- AN OVERVIEW OF BIG DATA SOLUTIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 2 -- DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALS -- INTRODUCTION -- THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS -- TECHNOLOGY CHALLENGES -- EXAMPLES -- CONCLUSION -- REFERENCE -- Section 2 -- CORE CONCEPTS AND APPLICATION SCENARIOS -- CHAPTER 3 -- HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM -- INTRODUCTION -- A NEW TERROR -- CHANGING THREAT LANDSCAPE -- EMBRACING BIG DATA -- CONCLUSION -- REFERENCES -- CHAPTER 4 -- BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY -- THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENT -- CASE EXAMPLE AND WORKSHOP OVERVIEW -- SITUATIONAL AWARENESS -- TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA -- SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP -- TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP -- LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS -- DISCUSSION -- ACKNOWLEDGMENTS -- REFERENCES -- CHAPTER 5 -- INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS -- INTRODUCTION -- IMPORTANCE OF THE CASE -- THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001 -- RELEVANT EVIDENCE
POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSIS -- POTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION -- FINAL WORDS: INTERPRETATION AND INSIDER THREAT -- REFERENCES -- CHAPTER 6 -- CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA -- INTRODUCTION -- UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED -- WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE? -- UNDERPINNING THE SCR -- STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 7 -- MILITARY AND BIG DATA REVOLUTION -- RISK OF COLLAPSE -- INTO THE BIG DATA ARENA -- SIMPLE TO COMPLEX USE CASES -- CANONIC USE CASES -- MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS) -- REAL-TIME BIG DATA SYSTEMS -- IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM -- INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS -- VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS -- CONCLUSIONS -- FURTHER READING -- CHAPTER 8 -- CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY -- INTRODUCTION -- DEFINING CYBERCRIME AND CYBERTERRORISM -- ATTACK CLASSIFICATION AND PARAMETERS -- WHO PERPETRATES THESE ATTACKS? -- TOOLS USED TO FACILITATE ATTACKS -- MOTIVATIONS -- ATTACK MOTIVATIONS TAXONOMY -- DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION -- CONCLUSION -- REFERENCES -- Section 3 -- METHODS AND TECHNOLOGICAL SOLUTIONS -- CHAPTER 9 -- REQUIREMENTS AND CHALLENGES FOR BIG DATA ARCHITECTURES -- WHAT ARE THE CHALLENGES INVOLVED IN BIG DATA PROCESSING? -- TECHNOLOGICAL UNDERPINNING -- PLANNING FOR A BIG DATA PLATFORM -- CONCLUSIONS -- REFERENCES -- CHAPTER 10 -- TOOLS AND TECHNOLOGIES FOR THE IMPLEMENTATION OF BIG DATA -- INTRODUCTION -- TECHNIQUES -- Analysis -- COMPUTATIONAL TOOLS -- IMPLEMENTATION -- PROJECT INITIATION AND LAUNCH -- DATA SOURCES AND ANALYTICS -- ANALYTICS PHILOSOPHY: ANALYSIS OR SYNTHESIS
GOVERNANCE AND COMPLIANCE -- REFERENCES -- CHAPTER 11 -- MINING SOCIAL MEDIA: ARCHITECTURE, TOOLS, AND APPROACHES TO DETECTING CRIMINAL ACTIVITY -- INTRODUCTION -- MINING OF SOCIAL NETWORKS FOR CRIME -- TEXT MINING -- NATURAL LANGUAGE METHODS -- GENERAL ARCHITECTURE AND VARIOUS COMPONENTS OF TEXT MINING -- AUTOMATIC EXTRACTION OF BNS FROM TEXT -- BNS AND CRIME DETECTION -- CONCLUSIONS -- REFERENCES -- CHAPTER 12 -- MAKING SENSE OF UNSTRUCTURED NATURAL LANGUAGE INFORMATION -- INTRODUCTION -- BIG DATA AND UNSTRUCTURED DATA -- ASPECTS OF UNCERTAINTY IN SENSE MAKING -- SITUATION AWARENESS AND INTELLIGENCE -- PROCESSING NATURAL LANGUAGE DATA -- STRUCTURING NATURAL LANGUAGE DATA -- TWO SIGNIFICANT WEAKNESSES -- AN ALTERNATIVE REPRESENTATION FOR FLEXIBILITY -- CONCLUSIONS -- REFERENCES -- CHAPTER 13 -- LITERATURE MINING AND ONTOLOGY MAPPING APPLIED TO BIG DATA -- INTRODUCTION -- BACKGROUND -- ARIANA: ADAPTIVE ROBUST INTEGRATIVE ANALYSIS FOR FINDING NOVEL ASSOCIATIONS -- CONCEPTUAL FRAMEWORK OF ARIANA -- IMPLEMENTATION OF ARIANA FOR BIOMEDICAL APPLICATIONS -- CASE STUDIES -- DISCUSSION -- CONCLUSIONS -- ACKNOWLEDGMENT -- REFERENCES -- CHAPTER 14 -- BIG DATA CONCERNS IN AUTONOMOUS AI SYSTEMS -- INTRODUCTION -- ARTIFICIALLY INTELLIGENT SYSTEM MEMORY MANAGEMENT -- ARTIFICIAL MEMORY PROCESSING AND ENCODING -- CONSTRUCTIVIST LEARNING -- PRACTICAL SOLUTIONS FOR SECURE KNOWLEDGE DEVELOPMENT IN BIG DATA ENVIRONMENTS -- CONCLUSIONS -- REFERENCES -- Section 4 -- LEGAL AND SOCIAL CHALLENGES -- CHAPTER 15 -- THE LEGAL CHALLENGES OF BIG DATA APPLICATION IN LAW ENFORCEMENT -- INTRODUCTION -- LEGAL FRAMEWORK -- CONCLUSIONS -- REFERENCES -- CHAPTER 16 -- BIG DATA AND THE ITALIAN LEGAL FRAMEWORK: OPPORTUNITIES FOR POLICE FORCES -- INTRODUCTION -- EUROPEAN LEGAL FRAMEWORK -- THE ITALIAN LEGAL FRAMEWORK -- OPPORTUNITIES AND CONSTRAINTS FOR POLICE FORCES AND INTELLIGENCE -- REFERENCES
CHAPTER 17 -- ACCOUNTING FOR CULTURAL INFLUENCES IN BIG DATA ANALYTICS -- INTRODUCTION -- CONSIDERATIONS FROM CROSS-CULTURAL PSYCHOLOGY FOR BIG DATA ANALYTICS -- CULTURAL DEPENDENCE IN THE SUPPLY AND DEMAND SIDES OF BIG DATA ANALYTICS -- (MIS)MATCHES AMONG PRODUCER, PRODUCTION, INTERPRETER, AND INTERPRETATION CONTEXTS -- INTEGRATING CULTURAL INTELLIGENCE INTO BIG DATA ANALYTICS: SOME RECOMMENDATIONS -- CONCLUSIONS -- REFERENCES -- CHAPTER 18 -- MAKING SENSE OF THE NOISE: AN ABC APPROACH TO BIG DATA AND SECURITY -- HOW HUMANS NATURALLY DEAL WITH BIG DATA -- THE THREE STAGES OF DATA PROCESSING EXPLAINED -- THE PUBLIC ORDER POLICING MODEL AND THE COMMON OPERATIONAL PICTURE -- APPLICATIONS TO BIG DATA AND SECURITY -- APPLICATION TO BIG DATA AND NATIONAL SECURITY -- A FINAL CAVEAT FROM THE FBI BULLETIN -- REFERENCES -- Glossary -- Index
Summary Annotation 'Mining Big Data to Improve National Security' introduces state-of-the-art concepts and technologies surrounding big data, providing users with a strategic framework that can be used to combat terrorism and reduce crime
Bibliography Includes bibliographical referencesa and index
Notes Vendor-supplied metadata
Subject National security -- United States.
Big data.
Data protection.
Science and state.
Technology and state.
POLITICAL SCIENCE -- Public Affairs & Administration.
Technology and state
Big data
Data protection
National security
Science and state
United States
Form Electronic book
Author Akhgar, Babak, editor
ISBN 9780128019733
0128019735
0128019670
9780128019672