Security Informatics (eBook)
VI, 206 Seiten
Springer US (Verlag)
978-1-4419-1325-8 (ISBN)
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.
SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
Preface 5
Contents 7
Framing Social Movement Identity with Cyber-Artifacts:A Case Study of the International Falun Gong Movement 8
1 Introduction 9
2 Literature Review 10
2.1 Social Movement Theory 10
2.2 Social Movement Organizations and the Internet 11
2.3 Cyber-Society Archaeology 12
2.4 Social Network Analysis 12
2.5 Writeprints 14
3 Research Design: A Case Study of the International FLG Movement 16
3.1 The Falun Gong Movement 16
3.2 Research Design 17
3.2.1 Cyber-Artifacts Collection 17
3.2.2 Cyber-Artifact Analysis 20
4 Research Results 20
4.1 Link Analysis 20
4.2 Web Content Analysis 23
4.3 Forum Content Analysis 23
4.3.1 Thread Topics 23
4.3.2 Author Interaction 27
5 Conclusions 28
References 29
Patterns of Word Use for Deception in Testimony 31
1 Introduction 31
2 Related Work 32
2.1 The Pennebaker Model of Deception 33
2.2 Including Correlation in the Pennebaker Model 35
2.3 Interrogation 35
3 A New Model of Deception 36
4 Tuning the Model 37
4.1 Normalization 37
5 Experiment 39
6 Results 40
7 Conclusion 44
References 44
Information Integration for Terrorist or Criminal Social Networks 46
1 Introduction 47
2 Related Work 50
3 A Framework of Information Sharing and Privacy Preservation for Integrating Social Networks 53
4 Sub-graph Generalization 54
5 Policy of Sharing 55
6 Shared Information in a Generalized Node 56
7 Computation with Shared Information 57
8 Experiment 61
9 Conclusion 61
References 61
Processing Constrained k -Closest Pairs Queries in Crime Databases 63
1 Introduction 64
2 Related Work 66
3 Problem Description 66
4 k -CCPQ Processing Based on Growing Windows 68
4.1 Node Insertion 69
4.2 Node Update 69
4.3 Query Processing 70
5 Experiments 72
5.1 Query Time Comparison of 1-CCPQ Algorithms 73
5.2 The Effect of Overlap 74
5.3 The Effect of k 75
5.4 Disk Access Comparison Under Distinct Buffer Size 76
5.5 Comparison Between GWCCP and SRCP-Tree 77
6 Conclusions and Future Work 77
References 78
Emergency Response Through Higher Order VoronoiDiagrams 80
1 Introduction 80
2 What-If Modeling with Higher Order Voronoi Diagrams 82
3 What-If Emergency Response Through Higher Order Voronoi Diagrams 84
3.1 Framework of the Proposed What-If System 84
3.2 Complete Order- k Delaunay Triangle Data Structure 85
3.3 Algorithm and Analysis 86
3.4 Supporting What-If Queries 87
3.5 What-If Emergency Response Analysis with Dynamic Updates 89
3.6 What-If Emergency Response Analysis with Homogeneous Voronoi Diagrams 90
3.7 What-If Emergency Response Analysis with Heterogeneous Voronoi Diagrams 91
4 What-If Emergency Response with Real Data Sets 92
4.1 Case Study 1 93
4.2 Case Study 2 93
4.3 Case Study 3 94
5 Further Development into Minkowski Metrics 95
6 Final Remarks 96
References 96
Identity Management Architecture 99
1 Introduction 99
2 Background 101
2.1 Basic Definitions 101
2.2 Identity (Entity) Resolution 102
2.3 Identity Management Systems 103
2.4 Identity Theft and Identity Fraud 104
2.5 Privacy and Trust 105
2.6 Advanced Research on Identity Management 106
3 The Formal Model 106
3.1 Basics 107
3.2 Mapping Partial Identities to Identities 109
3.3 Evolution of Partial Identities 110
3.3.1 Identity Resolution 110
4 Applications 112
4.1 Identity Theft 113
4.2 Other Applications 116
5 Conclusions and Future Work 117
References 117
A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems 119
1 Introduction 119
2 IDS Overlay Network 121
3 DAMAG 122
3.1 The Security Risk Game 124
3.2 The Agent Deployment Game 127
4 Simulation Experiments 129
5 Related Works 133
6 Conclusions and Future Work 134
References 135
ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation 136
1 Introduction 137
2 National Plant Diagnostic Network 139
3 Architecture of ETKnet 139
4 Distributed Event and Rule Processing 142
5 Implementation 144
5.1 XML-Based Knowledge and Process Specification Language 144
5.1.1 Integrity Constraint Rule 144
5.1.2 Derivation Rule 145
5.1.3 Action-Oriented Rule 146
5.1.4 Rule Structure 147
5.2 User Interface 147
6 Research Issues 152
7 Conclusion 153
References 153
Duplicate Work Reduction in Business Continuity and Risk Management Processes 155
1 Introduction 155
2 Background Knowledge 157
2.1 Business Continuity Management 157
2.2 Risk Management 158
3 Duplicate Work in Business and Risk Management Processes 159
4 System Overview 160
5 Main Components 161
5.1 Asset and Relationship Management 161
5.2 Risk Identification and Assessment 163
5.3 Incident Management and Risk Verification 165
6 Integrating Risk Management and Business Continuity Management Processes 166
7 Example 167
8 Conclusions and Future Work 168
References 169
| Erscheint lt. Verlag | 8.1.2010 |
|---|---|
| Reihe/Serie | Annals of Information Systems | Annals of Information Systems |
| Zusatzinfo | VI, 206 p. 60 illus. |
| Verlagsort | New York |
| Sprache | englisch |
| Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
| Informatik ► Netzwerke ► Sicherheit / Firewall | |
| Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
| Wirtschaft ► Betriebswirtschaft / Management ► Planung / Organisation | |
| Wirtschaft ► Betriebswirtschaft / Management ► Wirtschaftsinformatik | |
| Schlagworte | Identity Management • information system • Information Technology (IT) • Intelligence • Knowledge • network analysis • Networks • protection • security • service-oriented computing • Social Networks • Text Mining |
| ISBN-10 | 1-4419-1325-4 / 1441913254 |
| ISBN-13 | 978-1-4419-1325-8 / 9781441913258 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich