Emergent Information Technologies and Enabling Policies for Counter-Terrorism

Robert L. Popp, John Yen

Research output: Book/ReportBook

13 Citations (Scopus)

Abstract

Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security. After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling. Quantitative and computational social science. Signal processing and information management techniques. Semantic Web and knowledge management technologies. Information and intelligence sharing technologies. Text/data processing and language translation technologies. Social network analysis. Legal standards for data mining. Potential structures for enabling policies. Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

Original languageEnglish (US)
PublisherJohn Wiley and Sons
Number of pages465
ISBN (Print)9780471776154
DOIs
StatePublished - Oct 7 2005

Fingerprint

Terrorism
Information technology
terrorism
information technology
intelligence
open society
Social sciences
National security
information management
Knowledge management
Semantic Web
Electric network analysis
network analysis
national security
knowledge management
Information management
Data mining
privacy
decision maker
social network

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Social Sciences(all)

Cite this

@book{f2dac4931c24462792c7714dea12ec49,
title = "Emergent Information Technologies and Enabling Policies for Counter-Terrorism",
abstract = "Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security. After the September 11th attacks, {"}connecting the dots{"} has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling. Quantitative and computational social science. Signal processing and information management techniques. Semantic Web and knowledge management technologies. Information and intelligence sharing technologies. Text/data processing and language translation technologies. Social network analysis. Legal standards for data mining. Potential structures for enabling policies. Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.",
author = "Popp, {Robert L.} and John Yen",
year = "2005",
month = "10",
day = "7",
doi = "10.1002/047178656X",
language = "English (US)",
isbn = "9780471776154",
publisher = "John Wiley and Sons",

}

Emergent Information Technologies and Enabling Policies for Counter-Terrorism. / Popp, Robert L.; Yen, John.

John Wiley and Sons, 2005. 465 p.

Research output: Book/ReportBook

TY - BOOK

T1 - Emergent Information Technologies and Enabling Policies for Counter-Terrorism

AU - Popp, Robert L.

AU - Yen, John

PY - 2005/10/7

Y1 - 2005/10/7

N2 - Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security. After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling. Quantitative and computational social science. Signal processing and information management techniques. Semantic Web and knowledge management technologies. Information and intelligence sharing technologies. Text/data processing and language translation technologies. Social network analysis. Legal standards for data mining. Potential structures for enabling policies. Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

AB - Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security. After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling. Quantitative and computational social science. Signal processing and information management techniques. Semantic Web and knowledge management technologies. Information and intelligence sharing technologies. Text/data processing and language translation technologies. Social network analysis. Legal standards for data mining. Potential structures for enabling policies. Technical system design to support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers.

UR - http://www.scopus.com/inward/record.url?scp=84889265928&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84889265928&partnerID=8YFLogxK

U2 - 10.1002/047178656X

DO - 10.1002/047178656X

M3 - Book

AN - SCOPUS:84889265928

SN - 9780471776154

BT - Emergent Information Technologies and Enabling Policies for Counter-Terrorism

PB - John Wiley and Sons

ER -