Stakeholder security: the new western way of counter-terrorism?

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Workshop on Data Mining for Counter Terrorism and Security

Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by ra...

متن کامل

Mapping Information Security Standards: A Counter-Terrorism Example

Although practitioners have mapped the alignment between IT-related standards, this work has rarely been reported in the academic literature. In particular the methods used have not been made explicit, which has limited the value of any reported results. The research described in this paper demonstrates a rigorous method for mapping the alignment between two example IT security standards. The t...

متن کامل

Data Mining for Counter-Terrorism

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...

متن کامل

Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds"

The United States armed forces could be considered the world's most powerful military force. However, in modern conflicts, techniques of asymmetric warfare (terrorism) wreak havoc on the inflexible, regardless of technological or numerical advantage. In order to be more effective, the US military must improve its counter-terrorism (CT) capabilities and flexibility. In this light, the authors mo...

متن کامل

The Proceedings of the 2 nd Australian Counter Terrorism Conference

In the immediate aftermath of al-Qaeda‘s September 11 attacks on the United States of America, examinations of terrorist funding focused on the Middle Eastern and South Asian use of Hawala and non-traceable financial transactions. However, whilst the cloaking of identity is certainly a part of criminal activity for funds transfer, there are other factors. South Asia‘s community banking norms al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Contemporary Politics

سال: 2010

ISSN: 1356-9775,1469-3631

DOI: 10.1080/13569771003783943