NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Security technologies and social implications / (Record no. 12908)

MARC details
000 -LEADER
fixed length control field 04547cam a2200565 i 4500
001 - CONTROL NUMBER
control field on1340411289
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125544.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220622s2023 njuab ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2022029633
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency OCLCF
-- YDX
-- DG1
-- IEEEE
-- N$T
-- OCLCO
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119834163
Qualifying information electronic publication
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119834151
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119834155
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119834175
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119834171
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119834168
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119834144
Qualifying information hardcover
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119834175
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1340411289
037 ## - SOURCE OF ACQUISITION
Stock number 9928039
Source of stock number/acquisition IEEE
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV7936.A8
Item number S39 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.2/3
Edition number 23/eng/20220805
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 00 - TITLE STATEMENT
Title Security technologies and social implications /
Statement of responsibility, etc. edited by Garik Markarian, Ruza Karlovic, Holger Nitsch, Krishna Chandramouli.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc.,
Date of production, publication, distribution, manufacture, or copyright notice [2023]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details illustrations (chiefly color), maps (some color)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, Machine Learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime in general and cybercrime in particular, become more and more sophisticated, security requires a complex mix of social measures which include prevention, detection, investigation and prosecution. Effective solutions to this problem require continuous synergy and innovation from different scientific fields and their incorporation into the day-to-day practice of law enforcement agencies (LEAs). The use of technologies by LEAs is mandated in two different ways: - use of legacy technologies and novel platforms specifically dedicated for LEA applications (which we will refer to as professional LEA technology platforms) - technologies introduced for other (e.g. consumer) applications but which can be utilised by LEAs enabling new ways of activities (which we will refer to as consumer technologies). Law enforcement agencies need to understand technologies available, uses and limitations, and ethical, regulatory or legal issues."--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on online resource; title from digital title page (viewed on October 21, 2022).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note The circle of change: technology impact on LEAs -- Data Protection Impact Assessments in Law Enforcement: Identifying and Mitigating Risks in Algorithmic Policing -- Methods of Stakeholder Engagement for the Co-Design of Security Technologies -- Performance Assessment of Soft biometrics technologies for border crossing -- Counter-Unmanned Aerial Vehicle Systems: Technical, Training and Regulatory Challenges -- Critical Infrastructure security using Computer Vision Technologies -- Evaluation of Content Fusion Algorithms for Large and Heterogeneous Datasets -- Stakeholder Engagement Model to facilitate the uptake by end-users of Crisis Communication Systems -- CRIME MAPPING IN CRIME ANALYSIS - THE DEVELOPMENTS IN THE PAST TWO DECADES -- The Threat of Behavioural Radicalization Online: Conceptual Challenges and Technical Solutions Provided by the PROPHETS (Preventing Radicalization Online through the Proliferation of Harmonized ToolkitS) Project -- Blockchain technologies for chain of custody authentication -- Chances and challenges of predictive policing for law enforcement agencies -- Conclusions.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Law enforcement
General subdivision Technological innovations.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Lois
General subdivision Application
-- Innovations.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Law enforcement
General subdivision Technological innovations
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Markarian, Garik,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Karlovic, Ru�za,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nitsch, Holger,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chandramouli, Krishna,
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Security technologies and social implications
Place, publisher, and date of publication Hoboken, New Jersey : Wiley, [2022]
International Standard Book Number 9781119834144
Record control number (DLC) 2022029632
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175</a>
938 ## -
-- EBSCOhost
-- EBSC
-- 3405535
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha