The book has been organized into three parts: Unit 1 covers the international foundations of digital government and related social, public, and legal issues (such as privacy, confidentiality, trust and security) that are evolving from governments’ new ways of doing business. Unit 2 examines current IT research that is impacting the advancement of digital government purposes and initiatives. In this section, a wide range of technologies are discussed with the objective of outlining a framework of state-of-the-art technologies showing the most promise for e-government initiatives. Unit 3 highlights case studies and applications of successful e-government initiatives from around the world which have wider lessons and implications. High impact projects are explored in detail, with a "lessons learned" discussion included with each case study. Each chapter is accompanied by references, suggested additional readings, online resources, and questions for discussion.
The book’s audience is broad and includes: (1) faculty, researchers, graduate students and select undergraduate students in information sciences, information management, computer science, public policy, political science and other disciplines concerned with the functions of government and the public sector; (2) managers, administrators, and IT specialists in federal, state and local agencies with an interest in e-government initiatives and strategies; and (3) consultants and practitioners in IT, communications, data and information management, e-government, and program management who may be working or collaborating on e-government projects.
TERROR INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches. The book will bring "knowledge" that can be used by scientists, security professionals, counterterrorism experts, and policy makers.
The book will be organized into three major subject areas:
Part I will focus on the methodological issues in terrorism research. The methodological issues that impact trends, achievements, root causes, and failures in terrorism research will be treated within the context of the methods of retrieving and developing, sharing, and implementing terrorism informatics methodologies and resources. Part II will focus on three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. This section will systematically examine the current and ongoing research including recent case studies and application of terrorism informatics techniques. Examples of such techniques are web mining, social network analysis, and multimodal event extraction, analysis to the terrorism phenomenon, etc. Part III will present the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.
It will provide an integrated, synthesized, and interdisciplinary analysis of infectious surveillance techniques. It will include statistical modeling techniques, but go beyond statistical modeling to include information systems design, data standards, computational aspects of bio-surveillance, information visualization, and system evaluation.
It will emphasize the practical importance of the area and integrate the material from Public Health, Computer Science, Information Systems, Software Engineering, Public Administration Policy, Geographical Information Systems, etc. into a unified state-of-the-art treatment of syndromic surveillance systems.
By its very nature, infectious disease surveillance is a dynamic, fast-moving field. Therefore the book will provide policy makers and public health practitioners with the most recent research findings, methodologies, and implementation issues from case studies of concrete application scenarios.
Prof. Zheng Qin is the Director of Software Engineering and Management Research Institute, Tsinghua University, China; Dr. Shundong Li is a Professor at the School of Computer Science, Shaanxi Normal University, China; Dr. Yang Chang and Dr. Fengxiang Li are both Research Assistants at the School of Software, Tsinghua University, China.