Home Page Icon
Home Page
Table of Contents for
Cover image
Close
Cover image
by Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Stanif
Application of Big Data for National Security
Title page
Table of Contents
Copyright
About the Editors
Foreword by Lord Carlile of Berriew
Preface by Edwin Meese III
Acknowledgments
Section 1. Introduction to Big Data
Chapter 1. An Introduction to Big Data
What Is Big Data?
How Different Is Big Data?
More on Big Data: Types and Sources
The Five V’s of Big Data
Big Data in the Big World
Analytical Capabilities of Big Data
Streaming Analytics
An Overview of Big Data Solutions
Conclusions
Chapter 2. Drilling into the Big Data Gold Mine: Data Fusion and High-Performance Analytics for Intelligence Professionals
Introduction
The Age of Big Data and High-Performance Analytics
Technology Challenges
Examples
Conclusion
Section 2. Core Concepts and Application Scenarios
Chapter 3. Harnessing the Power of Big Data to Counter International Terrorism
Introduction
A New Terror
Changing Threat Landscape
Embracing Big Data
Conclusion
Chapter 4. Big Data and Law Enforcement: Advances, Implications, and Lessons from an Active Shooter Case Study
The Intersection of Big Data and Law Enforcement
Case Example and Workshop Overview
Situational Awareness
Twitter as a Social Media Source of Big Data
Social Media Data Analyzed for the Workshop
Tools and Capabilities Prototypes during the Workshop
Law Enforcement Feedback for the Sessions
Discussion
Chapter 5. Interpretation and Insider Threat: Rereading the Anthrax Mailings of 2001 Through a “Big Data” Lens
Introduction
Importance of the Case
The Advancement of Big Data Analytics After 2001
Relevant Evidence
Potential for Stylometric and Sentiment Analysis
Potential for Further Pattern Analysis and Visualization
Final Words: Interpretation and Insider Threat
Chapter 6. Critical Infrastructure Protection by Harnessing Big Data
Introduction
Understanding the Strategic Landscape into which Big Data Must Be Applied
What Is Meant by an Overarching Architecture?
Underpinning the SCR
Strategic Community Architecture Framework
Conclusions
Chapter 7. Military and Big Data Revolution
Risk of Collapse
Into the Big Data Arena
Simple to Complex Use Cases
Canonic Use Cases
More on the Digital Version of the Real World (See the World as Events)
Real-Time Big Data Systems
Implementing the Real-Time Big Data System
Insight Into Deep Data Analytics Tools and Real-Time Big Data Systems
Very Short Loop and Battlefield Big Data Datacenters
Conclusions
Chapter 8. Cybercrime: Attack Motivations and Implications for Big Data and National Security
Introduction
Defining Cybercrime and Cyberterrorism
Attack Classification and Parameters
Who Perpetrates These Attacks?
Tools Used to Facilitate Attacks
Motivations
Attack Motivations Taxonomy
Detecting Motivations in Open-Source Information
Conclusion
Section 3. Methods and Technological Solutions
Chapter 9. Requirements and Challenges for Big Data Architectures
What Are the Challenges Involved in Big Data Processing?
Technological Underpinning
Planning for a Big Data Platform
Conclusions
Chapter 10. Tools and Technologies for the Implementation of Big Data
Introduction
Techniques
Analysis
Computational Tools
Implementation
Project Initiation and Launch
Data Sources and Analytics
Analytics Philosophy: Analysis or Synthesis
Governance and Compliance
Chapter 12. Making Sense of Unstructured Natural Language Information
Introduction
Big Data and Unstructured Data
Aspects of Uncertainty in Sense Making
Situation Awareness and Intelligence
Processing Natural Language Data
Structuring Natural Language Data
Two Significant Weaknesses
An Alternative Representation for Flexibility
Conclusions
Chapter 13. Literature Mining and Ontology Mapping Applied to Big Data
Introduction
Background
ARIANA: Adaptive Robust Integrative Analysis for Finding Novel Associations
Conceptual Framework of ARIANA
Implementation of ARIANA for Biomedical Applications
Case Studies
Discussion
Conclusions
Chapter 14. Big Data Concerns in Autonomous AI Systems
Introduction
Artificially Intelligent System Memory Management
Artificial Memory Processing and Encoding
Constructivist Learning
Practical Solutions for Secure Knowledge Development in Big Data Environments
Conclusions
Section 4. Legal and Social Challenges
Chapter 15. The Legal Challenges of Big Data Application in Law Enforcement
Introduction
Legal Framework
Conclusions
Chapter 16. Big Data and the Italian Legal Framework: Opportunities for Police Forces
Introduction
European Legal Framework
The Italian Legal Framework
Opportunities and Constraints for Police Forces and Intelligence
Chapter 17. Accounting for Cultural Influences in Big Data Analytics
Introduction
Considerations from Cross-Cultural Psychology for Big Data Analytics
Cultural Dependence in the Supply and Demand Sides of Big Data Analytics
(Mis)Matches among Producer, Production, Interpreter, and Interpretation Contexts
Integrating Cultural Intelligence into Big Data Analytics: Some Recommendations
Conclusions
Chapter 18. Making Sense of the Noise: An ABC Approach to Big Data and Security
How Humans Naturally Deal with Big Data
The Three Stages of Data Processing Explained
The Public Order Policing Model and the Common Operational Picture
Applications to Big Data and Security
Application to Big Data and National Security
A Final Caveat from the FBI Bulletin
Glossary
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset