메뉴 건너뛰기




Volumn 4, Issue 6, 2006, Pages 18-27

Countering terrorism through information and privacy protection technologies

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; DATA REDUCTION; INFORMATION TECHNOLOGY; SECURITY OF DATA; SOCIAL ASPECTS;

EID: 33845546728     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2006.147     Document Type: Article
Times cited : (32)

References (12)
  • 2
    • 33845546679 scopus 로고    scopus 로고
    • DARPA, May; [response to Consolidated Appropriations Resolution, Pub. L. no. 108-7, div. M, sec 111(b), 2003]
    • Report to Congress Regarding the Terrorism Information Awareness Program, DARPA, May 2003; [response to Consolidated Appropriations Resolution, Pub. L. no. 108-7, div. M, sec 111(b), 2003].
    • (2003) Report to Congress Regarding the Terrorism Information Awareness Program
  • 3
    • 4544276588 scopus 로고    scopus 로고
    • Overview of the information awareness office
    • DARPA
    • J. Poindexter, "Overview of the Information Awareness Office," DARPATech 2002, DARPA, 2002; www.fas.org/irp/agency/dod/poindexter.html.
    • (2002) DARPATech 2002
    • Poindexter, J.1
  • 4
    • 4243116398 scopus 로고    scopus 로고
    • Countering terrorism through information technology
    • R. Popp et al., "Countering Terrorism through Information Technology," Comm. ACM, vol. 47, no. 3, 2004, pp. 36-43.
    • (2004) Comm. ACM , vol.47 , Issue.3 , pp. 36-43
    • Popp, R.1
  • 5
    • 0242636955 scopus 로고    scopus 로고
    • Total information overload
    • E. Jonietz, "Total Information Overload," MIT Tech. Rev., vol. 106, no. 6, 2003, p. 68.
    • (2003) MIT Tech. Rev. , vol.106 , Issue.6 , pp. 68
    • Jonietz, E.1
  • 6
    • 33845540215 scopus 로고    scopus 로고
    • Signals and noise
    • S. Harris, "Signals and Noise," Nat'l J., vol. 38, no. 24, 2006, pp. 50-58.
    • (2006) Nat'l J. , vol.38 , Issue.24 , pp. 50-58
    • Harris, S.1
  • 10
    • 0031150446 scopus 로고    scopus 로고
    • Weaving technology and policy together to maintain confidentiality
    • L. Sweeney, "Weaving Technology and Policy Together to Maintain Confidentiality," J. Law, Medicine and Ethics, vol. 25, nos. 2-3, 1997, pp. 98-110.
    • (1997) J. Law, Medicine and Ethics , vol.25 , Issue.2-3 , pp. 98-110
    • Sweeney, L.1
  • 12
    • 85184381425 scopus 로고    scopus 로고
    • Privacy and consequences: Legal and policy structures for implementing new counter-terrorism technologies and protecting civil liberty
    • R. Popp and J. Yen, eds., Wiley & Sons/IEEE Press
    • P. Rosenzweig, "Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty," Emergent Information Technologies and Enabling Policies for Counter-Terrorism, R. Popp and J. Yen, eds., Wiley & Sons/IEEE Press, 2006, pp. 421-438.
    • (2006) Emergent Information Technologies and Enabling Policies for Counter-terrorism , pp. 421-438
    • Rosenzweig, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.