Cover image for Terrorism informatics : knowledge management and data mining for homeland security
Title:
Terrorism informatics : knowledge management and data mining for homeland security
Series:
Integrated Series In Information Systems, 18
Publication Information:
New York : Springer, 2008
Physical Description:
xlii, 558 p. : ill. ; 24 cm.
ISBN:
9780387716121

9780387716138

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010194323 QA76.9.D343 T47 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and they involve the collection of a mass of information from multiple sources and in numerous languages.

TERRORISM INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches.


Author Notes

The lead author is an editor for the IEEE Int. conference on Intelligence and Security Informatics and the founder of ISI conferences.


Table of Contents

Mihaela Bobeica and Jean-Paul Jéral and Teofilo Garcia and Clive Best Chapter Overview
Prefacep. xv
Editor Biographiesp. xix
Author Biographiesp. xxv
Unit I Methodological Issues In Terrorism Research
Chapter 1 Domain Mapping of Contemporary Terrorism ResearchEdna Reid and Hsinchun Chen
Chapter Overviewp. 3
1 Introductionp. 4
2 Related Workp. 4
3 Research Designp. 8
4 Resultsp. 11
5 Conclusionp. 20
6 Acknowledgementsp. 21
Referencesp. 21
Appendix: List of 42 Influential Terrorism Researchersp. 23
Suggested Readingsp. 26
Online Resourcesp. 26
Discussion Questionsp. 26
Chapter 2 Research on Terrorism: A Review of the Impact of 9/11 and the Global War on TerrorismAndrew Silke
Chapter Overviewp. 27
1 Introductionp. 28
2 The Nature of This Reviewp. 32
3 Trends in Data-Gathering and Analysisp. 33
4 Research on Terrorist Groupsp. 38
5 Research on Terrorist Tacticsp. 41
6 Some Conceptual Issuesp. 44
7 Conclusionsp. 46
Referencesp. 48
Suggested Readingsp. 49
Discussion Questionsp. 49
Chapter 3 Who Are the Key Figures in ""Terrorism Studies""?Sam Raphael
Chapter Overview

p. 51

1 Introductionp. 52
2 Constructing the Framework: The Multiplicity of ""Terrorism Studies,"" the Role of the Audience, and the Importance of Methdological Rigorp. 53
3 Employing the Framework: Selecting the Time Period; Constructing the Research Communityp. 56
4 Constructing the Audiencep. 59
5 Measuring the Opinions of the Relevant Audience: What Does the Peer Research Community Think?p. 60
Establishing the Threshold: Exactly What Determines an Expert as Key?p. 62
Conclusionp. 67
References and Footnotesp. 69
Suggested Readingsp. 72
Discussion Questionsp. 72
Chapter 4 Interviewing Terrorists: A Case for Primary ResearchJohn Horgan
Chapter Overviewp. 73
1 Introductionp. 74
2 Procuring Interviewsp. 75
3 A Case Illustration: Interviews with the IRAp. 79
4 Finding and ""Collecting"" Participantsp. 80
5 A Case Example: Interviewing a Terroristp. 85
6 Interview Considerationsp. 89
7 Issues of Validity and Reliabilityp. 94
8 Conclusionsp. 96
Post-Scriptp. 97
Referencesp. 97
Suggested Readingsp. 99
Discussion Questionsp. 99
Chapter 5 Resolving a Terrorist Insurgency by Addressing Its Root CausesJoshua Sinai
1 Introductionp. 102
2 Why Root Causes Are Significantp. 103
3 How to Resolve a Conflict's Root Causesp. 106
Conclusionp. 111
References and Footnotesp. 112
Suggested Readingsp. 114
Online Resourcesp. 114
Discussion Questionsp. 114
Chapter 6 A Quantitative Analysis of ""Root Causes of Conflict""p. 115
1 Introductionp. 116
2 Conflict Indicators and Automatic Data Analysis for Early Warningp. 117
3 LSA Applied to English Articles in EMMp. 120
4 Results and Discussionp. 124
5 Conclusions and Future Workp. 131
Referencesp. 132
Suggested Readingsp. 133
Online Resourcesp. 133
Discussion Questionsp. 133
Appendix 1 Tablesp. 134
Appendix 2 Conflict Indicatorsp. 136
Appendix 3 Figuresp. 137
Appendix 4 Word Listsp. 139
Chapter 7 Countering Terrorism with KnowledgeJames O. Ellis III
Chapter Overviewp. 141
1 Introductionp. 142
2 Problems in Researching Terrorismp. 142
3 Problems in Terrorism Researchp. 144
4 Problems in Terrorism Databasesp. 145
5 MIPT as an Information Clearinghousep. 147
6 MIPT-Funded Terrorism Databasesp. 149
7 MIPT Terrorism Knowledge Basep. 150
8 Better Knowing What We Know about Terrorismp. 151
9 Acknowledgementsp. 153
Referencesp. 153
Suggested Readingsp. 154
Online Resourcesp. 154
Discussion Questionsp. 155
Chapter 8 Toward a Target-specific Method of Threat AssessmentYael Shahar
Chapter Overviewp. 157
1 Introductionp. 158
2 Methodologyp. 158
3 Organization-specific Indicatorsp. 160
4 Synthesisp. 169
5 Summary: Scenarios Most Likely to Be Carried out by Relevant Terrorist Groupsp. 171
6 Conclusionp. 172
Suggested Readingsp. 173
Online Resourcesp. 174
Discussion Questionsp. 174
Chapter 9 Identifying and Exploiting Group Learning Patterns for CounterterrorismHoracio R. Trujillo and Brian A. Jackson
Chapter Overviewp. 175
1 Introductionp. 176
2 Organizational Learningp. 177
3 A Four Stage Model of Organizational Learningp. 178
4 Paths of Organizational Learningp. 182
5 Determinants of Organizational Learningp. 183
6 How an Organizational Learning Model Can Inform the Design of Terrorism Informatics Systemsp. 186
7 Conclusions and Discussionp. 190
8 Acknowledgementsp. 191
Notesp. 192
Referencesp. 194
Suggested Readingsp. 195
Online Resourcesp. 195
Discussion Questionsp. 195
Chapter 10 Homeland Insecurity: Data Mining, Privacy, Disclosure Limitation, and the Hunt for TerroristsStephen E. Fienberg
Chapter Overviewp. 197
1 Introductionp. 198
2 Homeland Security and the Search for Terroristsp. 200
3 Matching and Record Linkage Methodsp. 203
4 Encryption, Multi-party Computation, and Privacy-preserving Dataminingp. 205
5 Selective Revelation, Risk-utility Tradeoff, and Disclosure Limitation Assessmentp. 207
6 Analyzing Network Data Based on Transactionsp. 210
7 Conclusionsp. 212
8 Acknowledgmentsp. 214
Notesp. 214
Referencesp. 215
Suggested Readingsp. 217
Discussion Questionsp. 218
Unit II Terrorism Informatics To Support Prevention, Detection, And Response
Chapter 11 Case Study of Jihad on the Web: A Web Mining ApproachHsinchun Chen and Jialun Qin and Edna Reid and Yilu Zhou and Marc Sageman
Chapter Overviewp. 221
1 Introductionp. 222
2 Previous Researchp. 222
3 Proposed Approachp. 225
4 Analysis Resultsp. 228
5 Discussion and Future Workp. 233
Referencesp. 234
Suggested Readingsp. 235
Online Resourcesp. 235
Discussion Questionsp. 235
Chapter 12 Studying Global Extremist Organizations' Internet Presence Using the Dark Web Attribute System: A Three Region Comparison StudyJialun Qin and Yilu Zhou and Edna Reid and Hsinchun Chen
Chapter Overviewp. 237
1 Introductionp. 238
2 Literature Reviewp. 239
3 Studying Global Extremist Organizations' Internet Usage: A Three-Region Empirical Studyp. 243
4 Conclusions and Future Directionsp. 261
Referencesp. 263
Suggested Readingsp. 265
Online Resourcesp. 265
Discussion Questionsp. 266
Chapter 13 Content Analysis of Jihadi Extremist Groups' VideosArab Salem and Edna Reid and Hsinchun Chen
Chapter Overview

p. 267

1 Introductionp. 268
2 Related Workp. 269
3 Methodologyp. 272
4 Resultsp. 276
5 Conclusionp. 280
6 Acknowledgementsp. 281
Referencesp. 281
Suggested Readingsp. 283
Online Resourcesp. 283
Discussion Questionsp. 284
Chapter 14 Analysis of Affect Intensities in Extremist Group ForumsAhmed Abbasi and Hsinchun Chen
Chapter Overview

p. 285

1 Introductionp. 286
2 Related Workp. 287
3 Research Gaps and Questionsp. 292
4 Research Questionsp. 293
5 Research Designp. 294
6 System Designp. 294
7 Evaluationp. 297
8 Resultsp. 300
9 Conclusionsp. 303
Referencesp. 304
Suggested Readingsp. 306
Online Resourcesp. 306
Discussion Questionsp. 307
Chapter 15 Document Selection for Extracting Entity and Relationship Instances of Terrorist EventsZhen Sun and Ee-Peng Lim and Kuiyu Chang and Maggy Anastasia Suryanto and Rohan Kumar Gunaratna
Chapter Overview

p. 309

1 Introductionp. 310
2 Literature Reviewp. 313
3 Domain Specific Event Entity Relation Extraction Task with Document Rankingp. 317
4 Case Studiesp. 325
5 Conclusions and Discussionp. 343
6 Acknowledgementsp. 344
Referencesp. 344
Suggested Readingsp. 346
Online Resourcesp. 346
Discussion Questionsp. 346
Chapter 16 Data Distortion Methods and Metrics in a Terrorist Analysis SystemShuting Xu and Jun Zhang
Chapter Overview

p. 347

1 Introductionp. 348
2 Terrorist Analysis Systemp. 350
3 Data Distortionp. 350
4 Data Distortion Measuresp. 354
5 Utility Measurep. 357
6 Experiments and Resultsp. 358
7 Conclusions and Discussionsp. 361
Referencesp. 362
Suggested Readingsp. 364
Online Resourcesp. 364
Discussion Questionsp. 364
Chapter 17 Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)Yuval Elovici and Bracha Shapira and Mark Last and Omer Zaafrany and Menahem Friedman and Moti Schneider and Abraham Kandel
Chapter Overview

p. 365

1 Introductionp. 366
2 Related Workp. 367
3 Advanced Terrorist Detection Systemp. 368
4 Evaluationp. 374
5 Conclusions and Discussionp. 381
6 Acknowledgementsp. 382
Referencesp. 382
Suggested Readingsp. 384
Online Resourcesp. 384
Discussion Questionsp. 384
Chapter 18 Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-terrorism WeaponsXiaohua Hu and Xiaodan Zhang and Daniel Wu and Xiaohua Zhou and Peter Rumm
Chapter Overview

p. 385

1 Introductionp. 386
2 Related Worksp. 387
3 Background of Virus and Bacteriump. 387
4 Methodp. 389
5 Experimental Resultsp. 394
6 Potential Significance for Public Health and Homeland Securityp. 404
7 Acknowledgementsp. 404
Referencesp. 404
Suggested Readingsp. 405
Online Resourcesp. 405
Discussion Questionsp. 405
Chapter 19 Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous ContentOzgur Yilmazel and Svetlana Symonenko and Niranjan Balasubramanian and Elizabeth D. Liddy
Chapter Overview

p. 407

1 Introductionp. 408
2 Overview of Related Workp. 409
3 Case Study: One-class Categorization Approach to the Problem of Identifying Anomalous Contentp. 411
4 Conclusions and Discussionp. 420
Referencesp. 421
Acknowledgementsp. 423
Suggested Readingsp. 423
Online Resourcesp. 423
Discussion Questionsp. 423
Chapter 20 Individual and Collective Analysis of Anomalies in Message TrafficD.B. Skillicorn
Chapter Overview

p. 425

1 Introductionp. 426
2 Analysis of Single Messagesp. 428
3 Analysis of Multiple Messagesp. 435
4 Conclusionsp. 447
5 Acknowledgementsp. 448
Referencesp. 448
Suggested Readingsp. 449
Discussion Questionsp. 449
Chapter 21 Addressing Insider Threat through Cost-Sensitive Document ClassificationYoung-Woo Seo and Katia Sycara
Chapter Overview

p. 451

1 Introductionp. 452
2 Related Workp. 454
3 Overviewp. 455
4 Classification for Confidential Authorizationp. 457
5 Experimentsp. 461
6 Conclusionp. 468
7 Acknowledgmentsp. 470
Referencesp. 470
Suggested Readingsp. 471
Online Resourcesp. 472
Discussion Questionsp. 472
Chapter 22 Using Web Mining and Social Network Analysis to Study the Emergence of Cyber Communities in BlogsMichael Chau and Jennifer Xu
Chapter Overviewp. 473
1 Introductionp. 474
2 Research Backgroundp. 475
3 Research Questionsp. 479
4 A Framework for Blog Collection and Analysisp. 480
5 A Case Study on Xangap. 483
6 Conclusion and Future Directionsp. 488
7 Acknowledgementsp. 489
Referencesp. 489
Appendixp. 492
Suggested Readingsp. 493
Online Resourcesp. 493
Discussion Questionsp. 493
Chapter 23 Automatic Extraction of Deceptive Behavioral Cues from VideoThomas O. Meservy and Matthew L. Jensen and W. John Kruse and Judee K. Burgoon and Jay F. Nunamaker Jr.
Chapter Overviewp. 495
1 Introductionp. 496
2 Literature Reviewp. 496
3 Research Method and Examplesp. 501
4 Experiments and Resultsp. 510
5 Conclusionp. 512
6 Acknowledgementsp. 513
Referencesp. 513
Suggested Readingsp. 515
Online Resourcesp. 515
Discussion Questionsp. 516
Chapter 24 Situational Awareness Technologies for Disaster ResponseNaveen Ashish and Ronald Eguchi and Rajesh Hegde and Charles Huyck and Dmitri Kalashnikov and Sharad Mehrotra and Padhraic Smyth and Nalini Venkatasubramanian
Chapter Overviewp. 517
1 Introductionp. 518
2 Situational Awarenessp. 523
3 Event Extractionp. 527
4 Event Data Managementp. 531
5 Event Analysis and Visualizationp. 534
6 Artifactsp. 539
7 Conclusionp. 541
8 Acknowledgementsp. 542
Referencesp. 543
Online Resourcesp. 544
Questions for Discussionp. 544
Author Indexp. 545
Subject Indexp. 547