Coverart for item
The Resource Out of the ordinary : finding hidden threats by analyzing unusual behavior, John Hollywood [and others], (electronic resource)

Out of the ordinary : finding hidden threats by analyzing unusual behavior, John Hollywood [and others], (electronic resource)

Label
Out of the ordinary : finding hidden threats by analyzing unusual behavior
Title
Out of the ordinary
Title remainder
finding hidden threats by analyzing unusual behavior
Statement of responsibility
John Hollywood [and others]
Contributor
Subject
Language
eng
Summary
Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
Dewey number
363.32
Illustrations
  • illustrations
  • charts
Index
no index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1973-
http://library.link/vocab/relatedWorkOrContributorName
  • Hollywood, John S.
  • Rand Corporation
http://library.link/vocab/subjectName
  • Criminal behavior, Prediction of
  • Crime forecasting
  • Criminal methods
  • Terrorism
  • Terrorism
  • Intelligence service
  • National security
Label
Out of the ordinary : finding hidden threats by analyzing unusual behavior, John Hollywood [and others], (electronic resource)
Instantiates
Publication
Note
  • "MG-126-RC."
  • Title from title screen (viewed 11/23/2004)
Antecedent source
unknown
Bibliography note
Includes bibliographical references (pages 151-155) and appendices
Color
multicolored
Contents
Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture
Control code
ocm57032533
Dimensions
unknown
Extent
1 online resource (xxx, 155 pages)
File format
unknown
Form of item
online
Isbn
9781282451223
Level of compression
unknown
Note
eBooks on EBSCOhost
Other physical details
illustrations, charts
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)57032533
Label
Out of the ordinary : finding hidden threats by analyzing unusual behavior, John Hollywood [and others], (electronic resource)
Publication
Note
  • "MG-126-RC."
  • Title from title screen (viewed 11/23/2004)
Antecedent source
unknown
Bibliography note
Includes bibliographical references (pages 151-155) and appendices
Color
multicolored
Contents
Introduction -- Data analyzed in the ASAP Schema -- The Atypical Signal Analysis and Processing Architecture -- Finding the dots -- Connecting the dots -- Understanding the dots: generating and testing hypotheses -- Conclusion -- Case study: "The November 9th incident" -- Systems realted to the ASAP architecture
Control code
ocm57032533
Dimensions
unknown
Extent
1 online resource (xxx, 155 pages)
File format
unknown
Form of item
online
Isbn
9781282451223
Level of compression
unknown
Note
eBooks on EBSCOhost
Other physical details
illustrations, charts
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)57032533

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...