Skip to main content
  • Book
  • © 2010

Security Informatics

  • Outlines the foundations and parameters of the field of Intelligence and Security Informatics (ISIS)
  • While ISI is a relatively new field, it is expanding in a variety of directions with, at this point, very few authoritative, archival resources, editing volumes, or books to assist its development; this is an authoritative volume by leading experts in ISI
  • The volume’s audience will include the following: graduate level students in Information Systems, Information Sciences, Public Policy, Computer Science, Information Assurance, and Terrorism, researchers engaged in security informatics, homeland security, information policy, knowledge management, public administration, and counterterrorism, public and private sector practitioners in the national/international and homeland security area, consultants and contractors engaged in on-going relationships with federal, state, local, and international agencies on projects related to national security.
  • Includes supplementary material: sn.pub/extras

Part of the book series: Annals of Information Systems (AOIS, volume 9)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (9 chapters)

  1. Front Matter

    Pages i-vii
  2. Patterns of Word Use for Deception in Testimony

    • David B. Skillicorn, Ayron Little
    Pages 25-39
  3. Information Integration for Terrorist or Criminal Social Networks

    • Christopher C. Yang, Xuning Tang
    Pages 41-57
  4. Processing Constrained k-Closest Pairs Queries in Crime Databases

    • Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen, Michael Chau et al.
    Pages 59-75
  5. What-If Emergency Response Through Higher Order Voronoi Diagrams

    • Ickjai Lee, Reece Pershouse, Peter Phillips, Kyungmi Lee, Christopher Torpelund-Bruin
    Pages 77-95
  6. Identity Management Architecture

    • Uwe Glässer, Mona Vajihollahi
    Pages 97-116
  7. A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems

    • Yi-Ming Chen, Dachrahn Wu, Cheng-Kuang Wu
    Pages 117-133
  8. ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation

    • Stanley Y.W. Su, Howard W. Beck, Xuelian Xiao, Jeff DePree, Seema Degwekar, Chen Zhou et al.
    Pages 135-153
  9. Duplicate Work Reduction in Business Continuity and Risk Management Processes

    • Shi-Cho Cha, Pei-Wen Juo, Li-Ting Liu, Wei-Ning Chen
    Pages 155-170

About this book

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.

SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Editors and Affiliations

  • College of Information Science &, Drexel University, Philadelphia, U.S.A.

    Christopher C. Yang

  • School of Business, University of Hong Kong, Hong Kong, Hong Kong/PR China

    Michael Chau

  • Dept. Information Management, Central Police University, Taoyuan, Taiwan R.O.C.

    Jau-Hwang Wang

  • Eller College of Management , University of Arizona , Tucson, U.S.A.

    Hsinchun Chen

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access