You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004. The 29 revised full papers and 12 revised short papers presented together with 6 extended abstracts of posters and 3 panel discussion summaries were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on bioterrorism and disease informatics; data access, privacy, and trust management; data management and mining; deception detection; information assurance and infrastructure protection; monitoring and surveillance; security policies and evaluation; and social network analysis.
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005. The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.
This book is a compilation of a selected subset of research articles presented at the Eighth INFORMS Computing Society Conference, held in Chandler, Arizona, from January 8 to 10, 2003. The articles in this book represent the diversity and depth of the interface between ORiMS (operations research and the management sciences) and CS/AI (computer science and artificial intelligence ). This volume starts with two papers that represent the reflective and integrative thinking that is critical to any scientific discipline. These two articles present philosophical perspectives on computation, covering a variety of traditional and newer methods for modeling, solving, and explaining mathematical mode...
Experts in the intelligence community say that torture is ineffective. Yet much of the public appears unconvinced: surveys show that nearly half of Americans think that torture can be acceptable for counterterrorism purposes. Why do people persist in supporting torture—and can they be persuaded to change their minds? In Tortured Logic, Erin M. Kearns and Joseph K. Young draw upon a novel series of group experiments to understand how and why the average citizen might come to support the use of torture techniques. They find evidence that when torture is depicted as effective in the media, people are more likely to approve of it. Their analysis weighs variables such as the ethnicity of the in...
Since 9/11 we have been told that terrorists are pathological evildoers, beyond our comprehension. Before the 1970s, however, hijackings, assassinations, and other acts we now call 'terrorism' were considered the work of rational strategic actors. Disciplining Terror examines how political violence became 'terrorism', and how this transformation ultimately led to the current 'war on terror'. Drawing upon archival research and interviews with terrorism experts, Lisa Stampnitzky traces the political and academic struggles through which experts made terrorism, and terrorism made experts. She argues that the expert discourse on terrorism operates at the boundary - itself increasingly contested - between science and politics, and between academic expertise and the state. Despite terrorism now being central to contemporary political discourse, there have been few empirical studies of terrorism experts. This book investigates how the concept of terrorism has been developed and used over recent decades.
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
Knowledge-based systems, fully integrated with software, have become essential enablers for both science and commerce. But current software methodologies, tools and techniques are not robust or reliable enough for the demands of a constantly changing and evolving market, and many promising approaches have proved to be no more than case-oriented methods that are not fully automated. This book presents the proceedings of the 17th international conference on New Trends in Intelligent Software Methodology, Tools and Techniques (SoMeT18) held in Granada, Spain, 26-28 September 2018. The SoMeT conferences provide a forum for the exchange of ideas and experience, foster new directions in software d...
Deception offers a broadly accessible overview of state-of-the-art research on lies, trickery, cheating, and shams by leading experts in the natural and social sciences, as well as computing, the humanities, and the military.