This book focuses on applications of social network analysis in predictive policing. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature.
This book focuses on applications of social network analysis in predictive policing. Despite the importance of co-offending network analysis for pub...
Through a detailed critique of existing online social networks, this volume presents the technical and methodological aspects of designing social media platforms and applications. Readers will learn current techniques and best practices for designing and implementing social networks on the web.
Through a detailed critique of existing online social networks, this volume presents the technical and methodological aspects of designing social medi...
This book spotlights how women leaders behave in chaotic environments and features examples of women who have been key figures in determining complex socio-economic outcomes throughout history. Women leaders can be seen on many high- levels in the political arena, be they a prime minister, empress or opinion leader. From Kosem Sultan of the Ottoman Empire to Benazir Bhutto, women leaders have had an undeniable effect on modern history. Is it possible to understand the current role of women in politics in Turkey without the First Lady Emine Erdoğan? Can we analyze Europe's future without...
This book spotlights how women leaders behave in chaotic environments and features examples of women who have been key figures in determining complex ...
The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster management domain. This will be of particular interest to those working in the risk, crisis and disaster management domain as it will provide valuable insights into enabling resilience.
The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster ...
This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme.ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks.
This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme.ULOOP is f...
Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social,...
Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of...
Mutative Media is a sweeping examination of how communication technologies have contributed to changes in people's thoughts and actions, and thus in the power structures of societies, in the past, at present, and in four alternative futures.
We start by surveying what is generally known about the emergence of human language and speech that has enabled humans to extend their organizing abilities beyond that of other hominids. We then review research on the emergence of signs, symbols, and eventually writing, which led to new ways of thinking, acting, and organizing in scribal...
Mutative Media is a sweeping examination of how communication technologies have contributed to changes in people's thoughts and actions, and...
This book explores and explains collective action in the new generation of Information and Communication Technologies (ICT) enabled by Web 2.0, also referred to as social media, and its capacity to help critical decision and policy making.
This book explores and explains collective action in the new generation of Information and Communication Technologies (ICT) enabled by Web 2.0, also r...
The present volume providesa comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health.With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many...
The present volume providesa comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who alread...
Drawing on a range of expert contributions, this book assesses current approaches and technologies related to the security and privacy of social networks, outlines major challenges and offers perspectives on the direction of future research on the topic.
Drawing on a range of expert contributions, this book assesses current approaches and technologies related to the security and privacy of social netwo...