Yang, C.C., Chau, M., Wang, J.-H., Chen, H. (Eds.)
2010, VI, 206p. 120 illus., 60 illus. in color.
Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Outlines the foundations and parameters of the field of Intelligence and Security Informatics (ISIS)
While this is a relatively new field, it is expanding in a variety of directions with, at this point, very few authoritative, archival resources, editing volumes, or books to assist its development; this is an authoritative volume by leading experts in ISI
The volume’s audience will include the following: graduate level students in information systems, information sciences, public policy, computer science, information assurance, and terrorism, researchers engaged in security informatics, homeland security, information policy, knowledge management, public administration, and counterterrorism, public and private sector practitioners in the national/international and homeland security area, consultants and contractors engaged in on-going relationships with federal, state, local, and international agencies on projects related to national security
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.
SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
Content Level »Professional/practitioner
Keywords »Information Technology (IT) - Protection - identity management - information system - intelligence - knowledge - network analysis - networks - security - service-oriented computing - social networks - text mining