Yang / Chau / Wang | Security Informatics | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 9, 206 Seiten

Reihe: Annals of Information Systems

Yang / Chau / Wang Security Informatics


1. Auflage 2010
ISBN: 978-1-4419-1325-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, Band 9, 206 Seiten

Reihe: Annals of Information Systems

ISBN: 978-1-4419-1325-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Yang / Chau / Wang Security Informatics jetzt bestellen!

Weitere Infos & Material


1;Preface;5
2;Contents;7
3;Framing Social Movement Identity with Cyber-Artifacts:A Case Study of the International Falun Gong Movement;8
3.1;1 Introduction;9
3.2;2 Literature Review;10
3.2.1;2.1 Social Movement Theory;10
3.2.2;2.2 Social Movement Organizations and the Internet;11
3.2.3;2.3 Cyber-Society Archaeology;12
3.2.4;2.4 Social Network Analysis;12
3.2.5;2.5 Writeprints;14
3.3;3 Research Design: A Case Study of the International FLG Movement;16
3.3.1;3.1 The Falun Gong Movement;16
3.3.2;3.2 Research Design;17
3.3.2.1;3.2.1 Cyber-Artifacts Collection;17
3.3.2.2;3.2.2 Cyber-Artifact Analysis;20
3.4;4 Research Results;20
3.4.1;4.1 Link Analysis;20
3.4.2;4.2 Web Content Analysis;23
3.4.3;4.3 Forum Content Analysis;23
3.4.3.1;4.3.1 Thread Topics;23
3.4.3.2;4.3.2 Author Interaction;27
3.5;5 Conclusions;28
3.5.1;References;29
4;Patterns of Word Use for Deception in Testimony;31
4.1;1 Introduction;31
4.2;2 Related Work;32
4.2.1;2.1 The Pennebaker Model of Deception;33
4.2.2;2.2 Including Correlation in the Pennebaker Model;35
4.2.3;2.3 Interrogation;35
4.3;3 A New Model of Deception;36
4.4;4 Tuning the Model;37
4.4.1;4.1 Normalization;37
4.5;5 Experiment;39
4.6;6 Results;40
4.7;7 Conclusion;44
4.7.1;References;44
5;Information Integration for Terrorist or Criminal Social Networks;46
5.1;1 Introduction;47
5.2;2 Related Work;50
5.3;3 A Framework of Information Sharing and Privacy Preservation for Integrating Social Networks;53
5.4;4 Sub-graph Generalization;54
5.5;5 Policy of Sharing;55
5.6;6 Shared Information in a Generalized Node;56
5.7;7 Computation with Shared Information;57
5.8;8 Experiment;61
5.9;9 Conclusion;61
5.9.1;References;61
6;Processing Constrained k -Closest Pairs Queries in Crime Databases;63
6.1;1 Introduction;64
6.2;2 Related Work;66
6.3;3 Problem Description;66
6.4;4 k -CCPQ Processing Based on Growing Windows;68
6.4.1;4.1 Node Insertion;69
6.4.2;4.2 Node Update;69
6.4.3;4.3 Query Processing;70
6.5;5 Experiments;72
6.5.1;5.1 Query Time Comparison of 1-CCPQ Algorithms;73
6.5.2;5.2 The Effect of Overlap;74
6.5.3;5.3 The Effect of k ;75
6.5.4;5.4 Disk Access Comparison Under Distinct Buffer Size;76
6.5.5;5.5 Comparison Between GWCCP and SRCP-Tree;77
6.6;6 Conclusions and Future Work;77
6.6.1;References;78
7;Emergency Response Through Higher Order VoronoiDiagrams;80
7.1;1 Introduction;80
7.2;2 What-If Modeling with Higher Order Voronoi Diagrams;82
7.3;3 What-If Emergency Response Through Higher Order Voronoi Diagrams;84
7.3.1;3.1 Framework of the Proposed What-If System;84
7.3.2;3.2 Complete Order- k Delaunay Triangle Data Structure;85
7.3.3;3.3 Algorithm and Analysis;86
7.3.4;3.4 Supporting What-If Queries;87
7.3.5;3.5 What-If Emergency Response Analysis with Dynamic Updates;89
7.3.6;3.6 What-If Emergency Response Analysis with Homogeneous Voronoi Diagrams;90
7.3.7;3.7 What-If Emergency Response Analysis with Heterogeneous Voronoi Diagrams;91
7.4;4 What-If Emergency Response with Real Data Sets;92
7.4.1;4.1 Case Study 1;93
7.4.2;4.2 Case Study 2;93
7.4.3;4.3 Case Study 3;94
7.5;5 Further Development into Minkowski Metrics;95
7.6;6 Final Remarks;96
7.6.1;References;96
8;Identity Management Architecture;99
8.1;1 Introduction;99
8.2;2 Background;101
8.2.1;2.1 Basic Definitions;101
8.2.2;2.2 Identity (Entity) Resolution;102
8.2.3;2.3 Identity Management Systems;103
8.2.4;2.4 Identity Theft and Identity Fraud;104
8.2.5;2.5 Privacy and Trust;105
8.2.6;2.6 Advanced Research on Identity Management;106
8.3;3 The Formal Model;106
8.3.1;3.1 Basics;107
8.3.2;3.2 Mapping Partial Identities to Identities;109
8.3.3;3.3 Evolution of Partial Identities;110
8.3.3.1;3.3.1 Identity Resolution;110
8.4;4 Applications;112
8.4.1;4.1 Identity Theft;113
8.4.2;4.2 Other Applications;116
8.5;5 Conclusions and Future Work;117
8.6;References;117
9;A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems;119
9.1;1 Introduction;119
9.2;2 IDS Overlay Network;121
9.3;3 DAMAG;122
9.3.1;3.1 The Security Risk Game;124
9.3.2;3.2 The Agent Deployment Game;127
9.4;4 Simulation Experiments;129
9.5;5 Related Works;133
9.6;6 Conclusions and Future Work;134
9.6.1;References;135
10;ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation;136
10.1;1 Introduction;137
10.2;2 National Plant Diagnostic Network;139
10.3;3 Architecture of ETKnet;139
10.4;4 Distributed Event and Rule Processing;142
10.5;5 Implementation;144
10.5.1;5.1 XML-Based Knowledge and Process Specification Language;144
10.5.1.1;5.1.1 Integrity Constraint Rule;144
10.5.1.2;5.1.2 Derivation Rule;145
10.5.1.3;5.1.3 Action-Oriented Rule;146
10.5.1.4;5.1.4 Rule Structure;147
10.5.2;5.2 User Interface;147
10.6;6 Research Issues;152
10.7;7 Conclusion;153
10.7.1;References;153
11;Duplicate Work Reduction in Business Continuity and Risk Management Processes;155
11.1;1 Introduction;155
11.2;2 Background Knowledge;157
11.2.1;2.1 Business Continuity Management;157
11.2.2;2.2 Risk Management;158
11.3;3 Duplicate Work in Business and Risk Management Processes;159
11.4;4 System Overview;160
11.5;5 Main Components;161
11.5.1;5.1 Asset and Relationship Management;161
11.5.2;5.2 Risk Identification and Assessment;163
11.5.3;5.3 Incident Management and Risk Verification;165
11.6;6 Integrating Risk Management and Business Continuity Management Processes;166
11.7;7 Example;167
11.8;8 Conclusions and Future Work;168
11.9;References;169



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.