Application of big data for national security a practitioner's guide to emerging technologies

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international...

Descripción completa

Detalles Bibliográficos
Otros Autores: Akhgar, Babak, editor (editor), Abedi, Vida, contributor (contributor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Oxford, UK : Butterworth-Heinemann 2015.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628867806719
Tabla de Contenidos:
  • Front Cover; Application of Big Data for National Security: A Practitioner's Guide to Emerging Technologies; Copyright; Contents; List of Contributors; About the Editors; Foreword by Lord Carlile of Berriew; Preface by Edwin Meese III; Acknowledgments; Section 1 - INTRODUCTION TO BIG DATA; Chapter 1 - An Introduction to Big Data; WHAT IS BIG DATA?; HOW DIFFERENT IS BIG DATA?; MORE ON BIG DATA: TYPES AND SOURCES; THE FIVE V'S OF BIG DATA; BIG DATA IN THE BIG WORLD; ANALYTICAL CAPABILITIES OF BIG DATA; STREAMING ANALYTICS; AN OVERVIEW OF BIG DATA SOLUTIONS; CONCLUSIONS; REFERENCES
  • CHAPTER 2 - DRILLING INTO THE BIG DATA GOLD MINE: DATA FUSION AND HIGH-PERFORMANCE ANALYTICS FOR INTELLIGENCE PROFESSIONALSINTRODUCTION; THE AGE OF BIG DATA AND HIGH-PERFORMANCE ANALYTICS; TECHNOLOGY CHALLENGES; EXAMPLES; CONCLUSION; REFERENCE; Section 2 - CORE CONCEPTS AND APPLICATION SCENARIOS; CHAPTER 3 - HARNESSING THE POWER OF BIG DATA TO COUNTER INTERNATIONAL TERRORISM; INTRODUCTION; A NEW TERROR; CHANGING THREAT LANDSCAPE; EMBRACING BIG DATA; CONCLUSION; REFERENCES; CHAPTER 4 - BIG DATA AND LAW ENFORCEMENT: ADVANCES, IMPLICATIONS, AND LESSONS FROM AN ACTIVE SHOOTER CASE STUDY
  • THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENTCASE EXAMPLE AND WORKSHOP OVERVIEW; SITUATIONAL AWARENESS; TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA; SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP; TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP; LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS; DISCUSSION; ACKNOWLEDGMENTS; REFERENCES; CHAPTER 5 - INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS; INTRODUCTION; IMPORTANCE OF THE CASE; THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001; RELEVANT EVIDENCE
  • POTENTIAL FOR STYLOMETRIC AND SENTIMENT ANALYSISPOTENTIAL FOR FURTHER PATTERN ANALYSIS AND VISUALIZATION; FINAL WORDS: INTERPRETATION AND INSIDER THREAT; REFERENCES; CHAPTER 6 - CRITICAL INFRASTRUCTURE PROTECTION BY HARNESSING BIG DATA; INTRODUCTION; UNDERSTANDING THE STRATEGIC LANDSCAPE INTO WHICH BIG DATA MUST BE APPLIED; WHAT IS MEANT BY AN OVERARCHING ARCHITECTURE?; UNDERPINNING THE SCR; STRATEGIC COMMUNITY ARCHITECTURE FRAMEWORK; CONCLUSIONS; REFERENCES; CHAPTER 7 - MILITARY AND BIG DATA REVOLUTION; RISK OF COLLAPSE; INTO THE BIG DATA ARENA; SIMPLE TO COMPLEX USE CASES; CANONIC USE CASES
  • MORE ON THE DIGITAL VERSION OF THE REAL WORLD (SEE THE WORLD AS EVENTS)REAL-TIME BIG DATA SYSTEMS; IMPLEMENTING THE REAL-TIME BIG DATA SYSTEM; INSIGHT INTO DEEP DATA ANALYTICS TOOLS AND REAL-TIME BIG DATA SYSTEMS; VERY SHORT LOOP AND BATTLEFIELD BIG DATA DATACENTERS; CONCLUSIONS; FURTHER READING; CHAPTER 8 - CYBERCRIME: ATTACK MOTIVATIONS AND IMPLICATIONS FOR BIG DATA AND NATIONAL SECURITY; INTRODUCTION; DEFINING CYBERCRIME AND CYBERTERRORISM; ATTACK CLASSIFICATION AND PARAMETERS; WHO PERPETRATES THESE ATTACKS?; TOOLS USED TO FACILITATE ATTACKS; MOTIVATIONS; ATTACK MOTIVATIONS TAXONOMY
  • DETECTING MOTIVATIONS IN OPEN-SOURCE INFORMATION