Application of big data for national security a practitioner's guide to emerging technologies
Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Oxford, UK :
Butterworth-Heinemann
2015.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628867806719 |
Tabla de Contenidos:
- Front Cover; Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies; Copyright; Contents; List of Contributors; About the Editors; Foreword by Lord Carlile of Berriew; Preface by Edwin Meese III; Acknowledgments; Section 1 - INTRODUCTION TO BIG DATA; Chapter 1 - An Introduction to Big Data; WHAT IS BIG DATA?; HOW DIFFERENT IS BIG DATA?; MORE ON BIG DATA: TYPES AND SOURCES; THE FIVE V'S OF BIG DATA; BIG DATA IN THE BIG WORLD; ANALYTICAL CAPABILITIES OF BIG DATA; STREAMING ANALYTICS; AN OVERVIEW OF BIG DATA SOLUTIONS; CONCLUSIONS; REFERENCES
- CHAPTER 2 - DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALSINTRODUCTION; THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS; TECHNOLOGY CHALLENGES; EXAMPLES; CONCLUSION; REFERENCE; Section 2 - CORE CONCEPTS AND APPLICATION SCENARIOS; CHAPTER 3 - HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM; INTRODUCTION; A NEW TERROR; CHANGING THREAT LANDSCAPE; EMBRACING BIG DATA; CONCLUSION; REFERENCES; CHAPTER 4 - BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY
- THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENTCASE EXAMPLE AND WORKSHOP OVERVIEW; SITUATIONAL AWARENESS; TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA; SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP; TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP; LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS; DISCUSSION; ACKNOWLEDGMENTS; REFERENCES; CHAPTER 5 - INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS; INTRODUCTION; IMPORTANCE OF THE CASE; THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001; RELEVANT EVIDENCE
- POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSISPOTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION; FINAL WORDS: INTERPRETATION AND INSIDER THREAT; REFERENCES; CHAPTER 6 - CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA; INTRODUCTION; UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED; WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE?; UNDERPINNING THE SCR; STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK; CONCLUSIONS; REFERENCES; CHAPTER 7 - MILITARY AND BIG DATA REVOLUTION; RISK OF COLLAPSE; INTO THE BIG DATA ARENA; SIMPLE TO COMPLEX USE CASES; CANONIC USE CASES
- MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS)REAL-TIME BIG DATA SYSTEMS; IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM; INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS; VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS; CONCLUSIONS; FURTHER READING; CHAPTER 8 - CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY; INTRODUCTION; DEFINING CYBERCRIME AND CYBERTERRORISM; ATTACK CLASSIFICATION AND PARAMETERS; WHO PERPETRATES THESE ATTACKS?; TOOLS USED TO FACILITATE ATTACKS; MOTIVATIONS; ATTACK MOTIVATIONS TAXONOMY
- DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION