Comparative Study on Major Nations's Related Legislation for Counter-terrorism

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Mining for Counter-Terrorism

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...

متن کامل

A Neural Network for Counter-Terrorism

This article presents findings concerned with the use of neural networks in the identification of deceptive behaviour. A game designed by psychologists and criminologists was used for the generation of data used to test the appropriateness of different AI techniques in the quest for counter-terrorism. A feed forward back propagation network was developed and subsequent neural network experiment...

متن کامل

Modeling Values for Counter-Terrorism Analysis

Decisions are made to achieve objectives. A value model unambiguously represents objectives in a quantitative manner. Hence, a value model both guides thinking and provides a basis for analyzing alternatives to best meet the desired objectives. This paper proposes the development of value models to support counter-terrorism efforts. It summarizes the theory and procedures to develop value model...

متن کامل

Workshop on Data Mining for Counter Terrorism and Security

Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by ra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korea Contents Association

سال: 2010

ISSN: 1598-4877

DOI: 10.5392/jkca.2010.10.1.343