|
Showing 1 - 2 of
2 matches in All Departments
|
Protecting Persons While Protecting the People - Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers (Paperback, 2009 ed.)
Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
The Second Annual Workshop on Privacy and Security, organized by
the Center for Interdisciplinary Studies in Information Privacy and
Security of the School of C- munication and Information at Rutgers
University, was held on May 12, 2008 at the Hyatt Regency, New
Brunswick, New Jersey, USA. A few of the papers in this volume were
produced through a multi-step process. First, we recorded the talk
given by each author at the workshop in May 2008. Next, we
transcribed the recording. The authors then produced a draft of
their paper from these transcriptions, refining each draft until
the final version. Although the papers are not verbatim
transcriptions of the talks given, some do retain the informal and
conv- sational quality of the presentations. In one instance we
have included some material from the question-and-answer period
after the talk, since the material covered proved to be relevant
and interesting. The majority of authors, however, preferred to
include a more formal paper based on the material presented at the
workshop.
This work is intended to be of interest to counter-terrorism
experts and professionals, to academic researchers in information
systems, computer science, political science, and public policy,
and to graduate students in these areas. The goal of this book is
to highlight several aspects of patrolling the Web that were raised
and discussed by experts from different disciplines. The book
includes academic studies from related technical fields, namely,
computer science, and information technology, the strategic point
of view as presented by intelligence experts, and finally the
practical point of view by experts from related industry describing
lessons learned from practical efforts to tackle these problems.
This volume is organized into four major parts: definition and
analysis of the subject, data-mining techniques for terrorism
informatics, other theoretical methods to detect terrorists on the
Web, and practical relevant industrial experience on patrolling the
Web.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|