Stakeholder security: the new western way of counter-terrorism?
نویسندگان
چکیده
منابع مشابه
Workshop on Data Mining for Counter Terrorism and Security
Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by ra...
متن کاملMapping Information Security Standards: A Counter-Terrorism Example
Although practitioners have mapped the alignment between IT-related standards, this work has rarely been reported in the academic literature. In particular the methods used have not been made explicit, which has limited the value of any reported results. The research described in this paper demonstrates a rigorous method for mapping the alignment between two example IT security standards. The t...
متن کاملData Mining for Counter-Terrorism
Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...
متن کاملModeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds"
The United States armed forces could be considered the world's most powerful military force. However, in modern conflicts, techniques of asymmetric warfare (terrorism) wreak havoc on the inflexible, regardless of technological or numerical advantage. In order to be more effective, the US military must improve its counter-terrorism (CT) capabilities and flexibility. In this light, the authors mo...
متن کاملThe Proceedings of the 2 nd Australian Counter Terrorism Conference
In the immediate aftermath of al-Qaeda‘s September 11 attacks on the United States of America, examinations of terrorist funding focused on the Middle Eastern and South Asian use of Hawala and non-traceable financial transactions. However, whilst the cloaking of identity is certainly a part of criminal activity for funds transfer, there are other factors. South Asia‘s community banking norms al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Contemporary Politics
سال: 2010
ISSN: 1356-9775,1469-3631
DOI: 10.1080/13569771003783943