New Advances in Intelligence and Security Informatics
By Wenji Mao and FeiYue Wang
()
About this ebook
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.
Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. This book provides a comprehensive and interdisciplinary account of the new advances in ISI area along three fundamental dimensions: methodological issues in security informatics; new technological developments to support security-related modeling, detection, analysis and prediction; and applications and integration in interdisciplinary socio-cultural fields.
- Identifies emerging directions in ISI research and applications that address the research challenges with advanced technologies
- Provides an integrated account of the new advances in ISI field in three core aspects: methodology, technological developments and applications
- Benefits researchers as well as security professionals who are involved in cutting-edge research and applications in security informatics and related fields
Related to New Advances in Intelligence and Security Informatics
Related ebooks
Intelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsAutomating Open Source Intelligence: Algorithms for OSINT Rating: 5 out of 5 stars5/5OSINT in the Intelligence Era: Lecture notes Rating: 0 out of 5 stars0 ratingsIntroduction to Cyber-Warfare: A Multidisciplinary Approach Rating: 5 out of 5 stars5/5Information Security Science: Measuring the Vulnerability to Data Compromises Rating: 0 out of 5 stars0 ratingsThreat Intelligence A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsEffective Intelligence In Urban Environments Rating: 0 out of 5 stars0 ratingsAmerica's Strategic Blunders: Intelligence Analysis and National Security Policy, 1936–1991 Rating: 0 out of 5 stars0 ratingsHuman Intelligence Collector Operations Rating: 0 out of 5 stars0 ratingsCyber Warfare: Its Implications on National Security Rating: 0 out of 5 stars0 ratingsThe Faces of Terrorism: Social and Psychological Dimensions Rating: 5 out of 5 stars5/5Intelligence Gathering Network A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThe Grey Line: Modern Corporate Espionage and Counter Intelligence Rating: 0 out of 5 stars0 ratingsInformation Warfare: The Lost Tradecraft Rating: 0 out of 5 stars0 ratingsStrategic Intelligence for American National Security: Updated Edition Rating: 0 out of 5 stars0 ratingsEpistemology of Intelligence Agencies Rating: 0 out of 5 stars0 ratingsThreat Intelligence Feeds Third Edition Rating: 0 out of 5 stars0 ratingsCyber Guerilla Rating: 0 out of 5 stars0 ratingsOpen-source intelligence Second Edition Rating: 0 out of 5 stars0 ratingsAn Invisible Scalpel: Low-Visibility Operations in the War on Terror Rating: 0 out of 5 stars0 ratingsCounter Intelligence A Complete Guide - 2020 Edition Rating: 1 out of 5 stars1/5Client Confidential: Spooks, Secrets and Counter-Espionage in Celtic-Tiger Ireland Rating: 3 out of 5 stars3/5Intelligence Analysis A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCognitive traps for intelligence analysis The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsLikeWar: The Weaponization of Social Media by P. W. Singer | Conversation Starters Rating: 0 out of 5 stars0 ratingsInsider Threat A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsIntelligence Briefing: GMJ Books Rating: 0 out of 5 stars0 ratingsAmong Enemies: Counter-Espionage for the Business Traveler Rating: 0 out of 5 stars0 ratingsIntelligence Analyst A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings
Electrical Engineering & Electronics For You
Electrician's Pocket Manual Rating: 0 out of 5 stars0 ratingsNo Nonsense Technician Class License Study Guide: for Tests Given Between July 2018 and June 2022 Rating: 5 out of 5 stars5/5How to Diagnose and Fix Everything Electronic, Second Edition Rating: 4 out of 5 stars4/5The Fast Track to Your Technician Class Ham Radio License: For Exams July 1, 2022 - June 30, 2026 Rating: 5 out of 5 stars5/5The Homeowner's DIY Guide to Electrical Wiring Rating: 5 out of 5 stars5/5THE Amateur Radio Dictionary: The Most Complete Glossary of Ham Radio Terms Ever Compiled Rating: 4 out of 5 stars4/5Electrical Engineering 101: Everything You Should Have Learned in School...but Probably Didn't Rating: 5 out of 5 stars5/5Electricity for Beginners Rating: 5 out of 5 stars5/5Beginner's Guide to Reading Schematics, Fourth Edition Rating: 4 out of 5 stars4/5Ramblings of a Mad Scientist: 100 Ideas for a Stranger Tomorrow Rating: 0 out of 5 stars0 ratingsBasic Electricity Rating: 4 out of 5 stars4/5Basic Electronics: Book 2 Rating: 5 out of 5 stars5/5Upcycled Technology: Clever Projects You Can Do With Your Discarded Tech (Tech gift) Rating: 5 out of 5 stars5/5Programming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Practical Electrical Wiring: Residential, Farm, Commercial, and Industrial Rating: 4 out of 5 stars4/5Off-Grid Projects: Step-by-Step Guide to Building Your Own Off-Grid System Rating: 0 out of 5 stars0 ratingsNo Nonsense General Class License Study Guide: for Tests Given Between July 2019 and June 2023 Rating: 4 out of 5 stars4/5DIY Lithium Battery Rating: 3 out of 5 stars3/5Forrest Mims Engineer's Notebook Rating: 4 out of 5 stars4/5Very Truly Yours, Nikola Tesla Rating: 5 out of 5 stars5/5Electronics Engineering Rating: 0 out of 5 stars0 ratingsElectroculture - The Application of Electricity to Seeds in Vegetable Growing Rating: 0 out of 5 stars0 ratingsElectronics Explained: Fundamentals for Engineers, Technicians, and Makers Rating: 5 out of 5 stars5/5Two-Stroke Engine Repair and Maintenance Rating: 0 out of 5 stars0 ratingsUnderstanding Electricity Rating: 4 out of 5 stars4/5Schaum's Outline of Basic Electricity, Second Edition Rating: 5 out of 5 stars5/5Electrical Engineering Rating: 4 out of 5 stars4/5Electric Circuits Essentials Rating: 5 out of 5 stars5/5
Reviews for New Advances in Intelligence and Security Informatics
0 ratings0 reviews
Book preview
New Advances in Intelligence and Security Informatics - Wenji Mao
Index
Chapter 1
Intelligence and Security Informatics Research Frameworks
Intelligence and security informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national, and homeland security-related applications, through an integrated technological, organizational, and policy-based approach [1]. Traditionally, ISI research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection, and emergency responses for security informatics.
With the continuous advance of information technologies and the increasing sophistication of national and international security, in recent years new directions in ISI research and applications have emerged that address the research challenges with advanced technologies. To meet the challenges and achieve a methodology shift in ISI research and applications, we propose a social computing-based research paradigm consisting of a three-stage modeling, analysis, and control approach that researchers have used successfully to solve many natural and engineering science problems.
1.1 Research Methodology and Frameworks for ISI
In the past few years, ISI has experienced tremendous growth and made significant progress in academic research and practice involving both government agencies and industry. There have been a number of research methods and frameworks proposed to support intelligence and security informatics-related studies.
The Dark Web project developed one of the best-known ISI research frameworks. The project has for several years collected a wide variety of data relating to, and emanating from, extremist and terrorist groups. These data have included websites, multimedia material linked to the websites, forums, blogs, virtual world implementations, etc. The early system design contained three modules: data acquisition, data preparation, and system functionality. To further support its potential use as an open-source intelligence tool, several improvements in system functionality were later made [2].
New advances in ISI have emerged in recent years, especially the advancements in social-cultural computing. Subrahmanian [3] argues that cultural, economic, political, and religious factors can help policymakers predict the behavior of radical groups and proposes a cultural reasoning framework, CARA (Cognitive Architecture for Reasoning about Adversaries) [4]. CARA is comprised of four components, namely a Semantic Web extraction engine to elicit organization data, an opinion-mining engine that captures the group's opinions, an algorithm to correlate culturally relevant variables with the actions the organization takes, and a simulation environment within which analysts and users can experiment on hypothetical situations. When a new event occurs, CARA can forecast the k most probable sets of actions the group might take in a few minutes. To further develop CARA, several algorithms have been proposed to forecast the behavior of radical groups [5, 6].
Social computing refers to the computational facilitation of social studies and human social dynamics, as well as the design and use of information and communication technologies that consider the social context. As a new paradigm of computing and technology development, social computing can help us understand and analyze individual and organizational behavior and facilitate ISI research and applications in many aspects. To meet the challenges and achieve a methodology shift in ISI research and applications, we propose a social computing-based research paradigm called the ACP approach. Below, we introduce the three major components of ACP—namely, artificial societies for modeling (A), computational experiments for analysis (C), and parallel execution for control (P)—and discuss the philosophical and physical foundations of the ACP approach.
1.2 The ACP Approach
To achieve a paradigm shift in ISI research and applications, we propose adapting the three-stage modeling, analysis, and control approach that researchers have used successfully to solve many natural and engineering science problems [7, 8]. In this section, we describe what we call the ACP approach [8–12]: artificial societies for modeling, computational experiments for analysis, and parallel execution for control.
1.2.1 Modeling with Artificial Societies
There are as yet no effective, widely accepted methods for modeling complex systems, especially those involving human behavior and social organizations. Agent-based artificial societies or general artificial systems may be the most promising approach.
Modeling with artificial societies has three main parts: agents, environments, and rules for interactions. In this modeling approach, the accuracy of approximation to real systems is no longer the only objective, as it is in traditional computer simulations. Instead, the model society represented by an artificial system is considered real—an alternative possible realization of the target society. Along this line of thinking, the real society is also one possible realization. So, the behaviors of two societies, real and artificial, are different but are considered equivalent for evaluation and