Security technologies and social implications / (Record no. 12908)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04547cam a2200565 i 4500 |
001 - CONTROL NUMBER | |
control field | on1340411289 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125544.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220622s2023 njuab ob 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2022029633 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | DLC |
Modifying agency | OCLCF |
-- | YDX |
-- | DG1 |
-- | IEEEE |
-- | N$T |
-- | OCLCO |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119834163 |
Qualifying information | electronic publication |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119834151 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119834155 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119834175 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119834171 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119834168 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119834144 |
Qualifying information | hardcover |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119834175 |
Source of number or code | doi |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1340411289 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9928039 |
Source of stock number/acquisition | IEEE |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 04 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV7936.A8 |
Item number | S39 2023 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.2/3 |
Edition number | 23/eng/20220805 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
245 00 - TITLE STATEMENT | |
Title | Security technologies and social implications / |
Statement of responsibility, etc. | edited by Garik Markarian, Ruza Karlovic, Holger Nitsch, Krishna Chandramouli. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, Inc., |
Date of production, publication, distribution, manufacture, or copyright notice | [2023] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource : |
Other physical details | illustrations (chiefly color), maps (some color) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, Machine Learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime in general and cybercrime in particular, become more and more sophisticated, security requires a complex mix of social measures which include prevention, detection, investigation and prosecution. Effective solutions to this problem require continuous synergy and innovation from different scientific fields and their incorporation into the day-to-day practice of law enforcement agencies (LEAs). The use of technologies by LEAs is mandated in two different ways: - use of legacy technologies and novel platforms specifically dedicated for LEA applications (which we will refer to as professional LEA technology platforms) - technologies introduced for other (e.g. consumer) applications but which can be utilised by LEAs enabling new ways of activities (which we will refer to as consumer technologies). Law enforcement agencies need to understand technologies available, uses and limitations, and ethical, regulatory or legal issues."-- |
Assigning source | Provided by publisher. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on online resource; title from digital title page (viewed on October 21, 2022). |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The circle of change: technology impact on LEAs -- Data Protection Impact Assessments in Law Enforcement: Identifying and Mitigating Risks in Algorithmic Policing -- Methods of Stakeholder Engagement for the Co-Design of Security Technologies -- Performance Assessment of Soft biometrics technologies for border crossing -- Counter-Unmanned Aerial Vehicle Systems: Technical, Training and Regulatory Challenges -- Critical Infrastructure security using Computer Vision Technologies -- Evaluation of Content Fusion Algorithms for Large and Heterogeneous Datasets -- Stakeholder Engagement Model to facilitate the uptake by end-users of Crisis Communication Systems -- CRIME MAPPING IN CRIME ANALYSIS - THE DEVELOPMENTS IN THE PAST TWO DECADES -- The Threat of Behavioural Radicalization Online: Conceptual Challenges and Technical Solutions Provided by the PROPHETS (Preventing Radicalization Online through the Proliferation of Harmonized ToolkitS) Project -- Blockchain technologies for chain of custody authentication -- Chances and challenges of predictive policing for law enforcement agencies -- Conclusions. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Law enforcement |
General subdivision | Technological innovations. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Lois |
General subdivision | Application |
-- | Innovations. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Law enforcement |
General subdivision | Technological innovations |
Source of heading or term | fast |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Markarian, Garik, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Karlovic, Ru�za, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Nitsch, Holger, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chandramouli, Krishna, |
Relator term | editor. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Title | Security technologies and social implications |
Place, publisher, and date of publication | Hoboken, New Jersey : Wiley, [2022] |
International Standard Book Number | 9781119834144 |
Record control number | (DLC) 2022029632 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175</a> |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 3405535 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.