Campus conspiracies: security and intelligence engagement with universities from Kent State to counter-terrorism
نویسندگان
چکیده
منابع مشابه
Workshop on Data Mining for Counter Terrorism and Security
Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by ra...
متن کاملMapping Information Security Standards: A Counter-Terrorism Example
Although practitioners have mapped the alignment between IT-related standards, this work has rarely been reported in the academic literature. In particular the methods used have not been made explicit, which has limited the value of any reported results. The research described in this paper demonstrates a rigorous method for mapping the alignment between two example IT security standards. The t...
متن کاملA Soft Computing Model to Counter Terrorism
In the aftermath of September 11, the experts concluded that data mining could help it prevent future terrorist attacks. Experts are also concerned that in its zeal to apply technology to antiterrorism, the government could disrupt the crime-fighting processes of the agencies that are charged with finding and stopping terrorists before they act. The entire information or the evidence about a te...
متن کاملCounter Terrorism Measures to Combat Yersinia Pestis with Selenium Pharmaceuticals
The purpose of this study is to produce selenium labeled peptides and phage (bacterial viruses) that can selectively bind to the surface of the pathogenic bacteria Yersinia pestis (the plague) and inactivate it through the generation of superoxide radicals on its surface, similar to the way that it is inactivated by superoxide in macrophage. The results show that phage specific for a given bact...
متن کاملBlack Hole Final State Conspiracies
The principle that unitarity must be preserved in all processes, no matter how exotic, has led to deep insights into boundary conditions in cosmology and black hole theory. In the case of black hole evaporation, Horowitz and Maldacena were led to propose that unitarity preservation can be understood in terms of a restriction imposed on the wave function at the singularity. Gottesman and Preskil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Beliefs & Values
سال: 2019
ISSN: 1361-7672,1469-9362
DOI: 10.1080/13617672.2019.1602804