Security technologies and social implications:
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Inc
[2023]
|
Schlagwörter: | |
Links: | https://ieeexplore.ieee.org/book/9928039 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175 https://ieeexplore.ieee.org/book/9928039 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175 |
Abstract: | "In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, Machine Learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime in general and cybercrime in particular, become more and more sophisticated, security requires a complex mix of social measures which include prevention, detection, investigation and prosecution. Effective solutions to this problem require continuous synergy and innovation from different scientific fields and their incorporation into the day-to-day practice of law enforcement agencies (LEAs). The use of technologies by LEAs is mandated in two different ways: - use of legacy technologies and novel platforms specifically dedicated for LEA applications (which we will refer to as professional LEA technology platforms) - technologies introduced for other (e.g. consumer) applications but which can be utilised by LEAs enabling new ways of activities (which we will refer to as consumer technologies). Law enforcement agencies need to understand technologies available, uses and limitations, and ethical, regulatory or legal issues."-- |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xxi, 325 Seiten) Illustrationen, Diagramme |
ISBN: | 9781119834168 9781119834151 9781119834175 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV049479279 | ||
003 | DE-604 | ||
005 | 20240722 | ||
007 | cr|uuu---uuuuu | ||
008 | 231222s2023 xxua||| o|||| 00||| eng d | ||
020 | |a 9781119834168 |c electronic publication |9 978-1-119-83416-8 | ||
020 | |a 9781119834151 |c electronic book |9 978-1-119-83415-1 | ||
020 | |a 9781119834175 |c electronic book |9 978-1-119-83417-5 | ||
024 | 7 | |a 10.1002/9781119834175 |2 doi | |
035 | |a (ZDB-35-WIC)on1340411289 | ||
035 | |a (OCoLC)1418712708 | ||
035 | |a (DE-599)KEP083808108 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-473 |a DE-573 | ||
082 | 0 | |a 363.2/3 |2 23 | |
084 | |a MF 9500 |0 (DE-625)122811: |2 rvk | ||
245 | 1 | 0 | |a Security technologies and social implications |c edited by Garik Markarian, Ruža Karlović, Holger Nitsch, Krishna Chandramouli |
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Inc |c [2023] | |
300 | |a 1 Online-Ressource (xxi, 325 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a "In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, Machine Learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime in general and cybercrime in particular, become more and more sophisticated, security requires a complex mix of social measures which include prevention, detection, investigation and prosecution. Effective solutions to this problem require continuous synergy and innovation from different scientific fields and their incorporation into the day-to-day practice of law enforcement agencies (LEAs). The use of technologies by LEAs is mandated in two different ways: - use of legacy technologies and novel platforms specifically dedicated for LEA applications (which we will refer to as professional LEA technology platforms) - technologies introduced for other (e.g. consumer) applications but which can be utilised by LEAs enabling new ways of activities (which we will refer to as consumer technologies). Law enforcement agencies need to understand technologies available, uses and limitations, and ethical, regulatory or legal issues."-- | |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitstechnik |0 (DE-588)4077423-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Neue Technologie |0 (DE-588)4194462-8 |2 gnd |9 rswk-swf |
653 | 0 | |a Law enforcement / Technological innovations | |
653 | 0 | |a Law enforcement - Technological innovations | |
689 | 0 | 0 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Sicherheitstechnik |0 (DE-588)4077423-5 |D s |
689 | 0 | 3 | |a Neue Technologie |0 (DE-588)4194462-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Markarian, Garik |0 (DE-588)1328619389 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Security technologies and social implications |d Hoboken, New Jersey : Wiley, [2022] |z 9781119834144 |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/book/9928039 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
912 | |a ZDB-35-WEL | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034824748 | |
966 | e | |u https://ieeexplore.ieee.org/book/9928039 |l DE-573 |p ZDB-35-WEL |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175 |l DE-473 |p ZDB-35-WIC |q UBG_PDA_WIC_Kauf23 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1820966199575445504 |
---|---|
adam_text | |
any_adam_object | |
author2 | Markarian, Garik |
author2_role | edt |
author2_variant | g m gm |
author_GND | (DE-588)1328619389 |
author_facet | Markarian, Garik |
building | Verbundindex |
bvnumber | BV049479279 |
classification_rvk | MF 9500 |
collection | ZDB-35-WIC ZDB-35-WEL |
ctrlnum | (ZDB-35-WIC)on1340411289 (OCoLC)1418712708 (DE-599)KEP083808108 |
dewey-full | 363.2/3 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.2/3 |
dewey-search | 363.2/3 |
dewey-sort | 3363.2 13 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie Politologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV049479279</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240722</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231222s2023 xxua||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119834168</subfield><subfield code="c">electronic publication</subfield><subfield code="9">978-1-119-83416-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119834151</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-83415-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119834175</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-83417-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119834175</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)on1340411289</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1418712708</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP083808108</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.2/3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 9500</subfield><subfield code="0">(DE-625)122811:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security technologies and social implications</subfield><subfield code="c">edited by Garik Markarian, Ruža Karlović, Holger Nitsch, Krishna Chandramouli</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Inc</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 325 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, Machine Learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime in general and cybercrime in particular, become more and more sophisticated, security requires a complex mix of social measures which include prevention, detection, investigation and prosecution. Effective solutions to this problem require continuous synergy and innovation from different scientific fields and their incorporation into the day-to-day practice of law enforcement agencies (LEAs). The use of technologies by LEAs is mandated in two different ways: - use of legacy technologies and novel platforms specifically dedicated for LEA applications (which we will refer to as professional LEA technology platforms) - technologies introduced for other (e.g. consumer) applications but which can be utilised by LEAs enabling new ways of activities (which we will refer to as consumer technologies). Law enforcement agencies need to understand technologies available, uses and limitations, and ethical, regulatory or legal issues."--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitstechnik</subfield><subfield code="0">(DE-588)4077423-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Neue Technologie</subfield><subfield code="0">(DE-588)4194462-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Law enforcement / Technological innovations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Law enforcement - Technological innovations</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitstechnik</subfield><subfield code="0">(DE-588)4077423-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Neue Technologie</subfield><subfield code="0">(DE-588)4194462-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Markarian, Garik</subfield><subfield code="0">(DE-588)1328619389</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Security technologies and social implications</subfield><subfield code="d">Hoboken, New Jersey : Wiley, [2022]</subfield><subfield code="z">9781119834144</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/book/9928039</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034824748</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/book/9928039</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC_Kauf23</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049479279 |
illustrated | Illustrated |
indexdate | 2025-01-11T15:18:15Z |
institution | BVB |
isbn | 9781119834168 9781119834151 9781119834175 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034824748 |
oclc_num | 1340411289 1418712708 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-573 |
owner_facet | DE-473 DE-BY-UBG DE-573 |
physical | 1 Online-Ressource (xxi, 325 Seiten) Illustrationen, Diagramme |
psigel | ZDB-35-WIC ZDB-35-WEL ZDB-35-WIC UBG_PDA_WIC_Kauf23 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | John Wiley & Sons, Inc |
record_format | marc |
spelling | Security technologies and social implications edited by Garik Markarian, Ruža Karlović, Holger Nitsch, Krishna Chandramouli Hoboken, NJ John Wiley & Sons, Inc [2023] 1 Online-Ressource (xxi, 325 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index "In contrast to classic tools, modern policing and security requires the development and implementation of new technologies using AI, Machine Learning, social media tracking, drones, robots, GIS, computer vision, and more. As crime in general and cybercrime in particular, become more and more sophisticated, security requires a complex mix of social measures which include prevention, detection, investigation and prosecution. Effective solutions to this problem require continuous synergy and innovation from different scientific fields and their incorporation into the day-to-day practice of law enforcement agencies (LEAs). The use of technologies by LEAs is mandated in two different ways: - use of legacy technologies and novel platforms specifically dedicated for LEA applications (which we will refer to as professional LEA technology platforms) - technologies introduced for other (e.g. consumer) applications but which can be utilised by LEAs enabling new ways of activities (which we will refer to as consumer technologies). Law enforcement agencies need to understand technologies available, uses and limitations, and ethical, regulatory or legal issues."-- Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Sicherheitstechnik (DE-588)4077423-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Neue Technologie (DE-588)4194462-8 gnd rswk-swf Law enforcement / Technological innovations Law enforcement - Technological innovations Innere Sicherheit (DE-588)4127888-4 s Computersicherheit (DE-588)4274324-2 s Sicherheitstechnik (DE-588)4077423-5 s Neue Technologie (DE-588)4194462-8 s DE-604 Markarian, Garik (DE-588)1328619389 edt Erscheint auch als Druck-Ausgabe Security technologies and social implications Hoboken, New Jersey : Wiley, [2022] 9781119834144 https://ieeexplore.ieee.org/book/9928039 Aggregator URL des Erstveröffentlichers Volltext https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security technologies and social implications Innere Sicherheit (DE-588)4127888-4 gnd Sicherheitstechnik (DE-588)4077423-5 gnd Computersicherheit (DE-588)4274324-2 gnd Neue Technologie (DE-588)4194462-8 gnd |
subject_GND | (DE-588)4127888-4 (DE-588)4077423-5 (DE-588)4274324-2 (DE-588)4194462-8 |
title | Security technologies and social implications |
title_auth | Security technologies and social implications |
title_exact_search | Security technologies and social implications |
title_full | Security technologies and social implications edited by Garik Markarian, Ruža Karlović, Holger Nitsch, Krishna Chandramouli |
title_fullStr | Security technologies and social implications edited by Garik Markarian, Ruža Karlović, Holger Nitsch, Krishna Chandramouli |
title_full_unstemmed | Security technologies and social implications edited by Garik Markarian, Ruža Karlović, Holger Nitsch, Krishna Chandramouli |
title_short | Security technologies and social implications |
title_sort | security technologies and social implications |
topic | Innere Sicherheit (DE-588)4127888-4 gnd Sicherheitstechnik (DE-588)4077423-5 gnd Computersicherheit (DE-588)4274324-2 gnd Neue Technologie (DE-588)4194462-8 gnd |
topic_facet | Innere Sicherheit Sicherheitstechnik Computersicherheit Neue Technologie |
url | https://ieeexplore.ieee.org/book/9928039 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119834175 |
work_keys_str_mv | AT markariangarik securitytechnologiesandsocialimplications |