Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010194323 | QA76.9.D343 T47 2008 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and they involve the collection of a mass of information from multiple sources and in numerous languages.
TERRORISM INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches.
Author Notes
The lead author is an editor for the IEEE Int. conference on Intelligence and Security Informatics and the founder of ISI conferences.
Table of Contents
Preface | p. xv |
Editor Biographies | p. xix |
Author Biographies | p. xxv |
Unit I Methodological Issues In Terrorism Research | |
Chapter 1 Domain Mapping of Contemporary Terrorism ResearchEdna Reid and Hsinchun Chen | |
Chapter Overview | p. 3 |
1 Introduction | p. 4 |
2 Related Work | p. 4 |
3 Research Design | p. 8 |
4 Results | p. 11 |
5 Conclusion | p. 20 |
6 Acknowledgements | p. 21 |
References | p. 21 |
Appendix: List of 42 Influential Terrorism Researchers | p. 23 |
Suggested Readings | p. 26 |
Online Resources | p. 26 |
Discussion Questions | p. 26 |
Chapter 2 Research on Terrorism: A Review of the Impact of 9/11 and the Global War on TerrorismAndrew Silke | |
Chapter Overview | p. 27 |
1 Introduction | p. 28 |
2 The Nature of This Review | p. 32 |
3 Trends in Data-Gathering and Analysis | p. 33 |
4 Research on Terrorist Groups | p. 38 |
5 Research on Terrorist Tactics | p. 41 |
6 Some Conceptual Issues | p. 44 |
7 Conclusions | p. 46 |
References | p. 48 |
Suggested Readings | p. 49 |
Discussion Questions | p. 49 |
Chapter 3 Who Are the Key Figures in ""Terrorism Studies""?Sam Raphael | |
Chapter Overview p. 51 | |
1 Introduction | p. 52 |
2 Constructing the Framework: The Multiplicity of ""Terrorism Studies,"" the Role of the Audience, and the Importance of Methdological Rigor | p. 53 |
3 Employing the Framework: Selecting the Time Period; Constructing the Research Community | p. 56 |
4 Constructing the Audience | p. 59 |
5 Measuring the Opinions of the Relevant Audience: What Does the Peer Research Community Think? | p. 60 |
Establishing the Threshold: Exactly What Determines an Expert as Key? | p. 62 |
Conclusion | p. 67 |
References and Footnotes | p. 69 |
Suggested Readings | p. 72 |
Discussion Questions | p. 72 |
Chapter 4 Interviewing Terrorists: A Case for Primary ResearchJohn Horgan | |
Chapter Overview | p. 73 |
1 Introduction | p. 74 |
2 Procuring Interviews | p. 75 |
3 A Case Illustration: Interviews with the IRA | p. 79 |
4 Finding and ""Collecting"" Participants | p. 80 |
5 A Case Example: Interviewing a Terrorist | p. 85 |
6 Interview Considerations | p. 89 |
7 Issues of Validity and Reliability | p. 94 |
8 Conclusions | p. 96 |
Post-Script | p. 97 |
References | p. 97 |
Suggested Readings | p. 99 |
Discussion Questions | p. 99 |
Chapter 5 Resolving a Terrorist Insurgency by Addressing Its Root CausesJoshua Sinai | |
1 Introduction | p. 102 |
2 Why Root Causes Are Significant | p. 103 |
3 How to Resolve a Conflict's Root Causes | p. 106 |
Conclusion | p. 111 |
References and Footnotes | p. 112 |
Suggested Readings | p. 114 |
Online Resources | p. 114 |
Discussion Questions | p. 114 |
Chapter 6 A Quantitative Analysis of ""Root Causes of Conflict"" | p. 115 |
1 Introduction | p. 116 |
2 Conflict Indicators and Automatic Data Analysis for Early Warning | p. 117 |
3 LSA Applied to English Articles in EMM | p. 120 |
4 Results and Discussion | p. 124 |
5 Conclusions and Future Work | p. 131 |
References | p. 132 |
Suggested Readings | p. 133 |
Online Resources | p. 133 |
Discussion Questions | p. 133 |
Appendix 1 Tables | p. 134 |
Appendix 2 Conflict Indicators | p. 136 |
Appendix 3 Figures | p. 137 |
Appendix 4 Word Lists | p. 139 |
Chapter 7 Countering Terrorism with KnowledgeJames O. Ellis III | |
Chapter Overview | p. 141 |
1 Introduction | p. 142 |
2 Problems in Researching Terrorism | p. 142 |
3 Problems in Terrorism Research | p. 144 |
4 Problems in Terrorism Databases | p. 145 |
5 MIPT as an Information Clearinghouse | p. 147 |
6 MIPT-Funded Terrorism Databases | p. 149 |
7 MIPT Terrorism Knowledge Base | p. 150 |
8 Better Knowing What We Know about Terrorism | p. 151 |
9 Acknowledgements | p. 153 |
References | p. 153 |
Suggested Readings | p. 154 |
Online Resources | p. 154 |
Discussion Questions | p. 155 |
Chapter 8 Toward a Target-specific Method of Threat AssessmentYael Shahar | |
Chapter Overview | p. 157 |
1 Introduction | p. 158 |
2 Methodology | p. 158 |
3 Organization-specific Indicators | p. 160 |
4 Synthesis | p. 169 |
5 Summary: Scenarios Most Likely to Be Carried out by Relevant Terrorist Groups | p. 171 |
6 Conclusion | p. 172 |
Suggested Readings | p. 173 |
Online Resources | p. 174 |
Discussion Questions | p. 174 |
Chapter 9 Identifying and Exploiting Group Learning Patterns for CounterterrorismHoracio R. Trujillo and Brian A. Jackson | |
Chapter Overview | p. 175 |
1 Introduction | p. 176 |
2 Organizational Learning | p. 177 |
3 A Four Stage Model of Organizational Learning | p. 178 |
4 Paths of Organizational Learning | p. 182 |
5 Determinants of Organizational Learning | p. 183 |
6 How an Organizational Learning Model Can Inform the Design of Terrorism Informatics Systems | p. 186 |
7 Conclusions and Discussion | p. 190 |
8 Acknowledgements | p. 191 |
Notes | p. 192 |
References | p. 194 |
Suggested Readings | p. 195 |
Online Resources | p. 195 |
Discussion Questions | p. 195 |
Chapter 10 Homeland Insecurity: Data Mining, Privacy, Disclosure Limitation, and the Hunt for TerroristsStephen E. Fienberg | |
Chapter Overview | p. 197 |
1 Introduction | p. 198 |
2 Homeland Security and the Search for Terrorists | p. 200 |
3 Matching and Record Linkage Methods | p. 203 |
4 Encryption, Multi-party Computation, and Privacy-preserving Datamining | p. 205 |
5 Selective Revelation, Risk-utility Tradeoff, and Disclosure Limitation Assessment | p. 207 |
6 Analyzing Network Data Based on Transactions | p. 210 |
7 Conclusions | p. 212 |
8 Acknowledgments | p. 214 |
Notes | p. 214 |
References | p. 215 |
Suggested Readings | p. 217 |
Discussion Questions | p. 218 |
Unit II Terrorism Informatics To Support Prevention, Detection, And Response | |
Chapter 11 Case Study of Jihad on the Web: A Web Mining ApproachHsinchun Chen and Jialun Qin and Edna Reid and Yilu Zhou and Marc Sageman | |
Chapter Overview | p. 221 |
1 Introduction | p. 222 |
2 Previous Research | p. 222 |
3 Proposed Approach | p. 225 |
4 Analysis Results | p. 228 |
5 Discussion and Future Work | p. 233 |
References | p. 234 |
Suggested Readings | p. 235 |
Online Resources | p. 235 |
Discussion Questions | p. 235 |
Chapter 12 Studying Global Extremist Organizations' Internet Presence Using the Dark Web Attribute System: A Three Region Comparison StudyJialun Qin and Yilu Zhou and Edna Reid and Hsinchun Chen | |
Chapter Overview | p. 237 |
1 Introduction | p. 238 |
2 Literature Review | p. 239 |
3 Studying Global Extremist Organizations' Internet Usage: A Three-Region Empirical Study | p. 243 |
4 Conclusions and Future Directions | p. 261 |
References | p. 263 |
Suggested Readings | p. 265 |
Online Resources | p. 265 |
Discussion Questions | p. 266 |
Chapter 13 Content Analysis of Jihadi Extremist Groups' VideosArab Salem and Edna Reid and Hsinchun Chen | |
Chapter Overview p. 267 | |
1 Introduction | p. 268 |
2 Related Work | p. 269 |
3 Methodology | p. 272 |
4 Results | p. 276 |
5 Conclusion | p. 280 |
6 Acknowledgements | p. 281 |
References | p. 281 |
Suggested Readings | p. 283 |
Online Resources | p. 283 |
Discussion Questions | p. 284 |
Chapter 14 Analysis of Affect Intensities in Extremist Group ForumsAhmed Abbasi and Hsinchun Chen | |
Chapter Overview p. 285 | |
1 Introduction | p. 286 |
2 Related Work | p. 287 |
3 Research Gaps and Questions | p. 292 |
4 Research Questions | p. 293 |
5 Research Design | p. 294 |
6 System Design | p. 294 |
7 Evaluation | p. 297 |
8 Results | p. 300 |
9 Conclusions | p. 303 |
References | p. 304 |
Suggested Readings | p. 306 |
Online Resources | p. 306 |
Discussion Questions | p. 307 |
Chapter 15 Document Selection for Extracting Entity and Relationship Instances of Terrorist EventsZhen Sun and Ee-Peng Lim and Kuiyu Chang and Maggy Anastasia Suryanto and Rohan Kumar Gunaratna | |
Chapter Overview p. 309 | |
1 Introduction | p. 310 |
2 Literature Review | p. 313 |
3 Domain Specific Event Entity Relation Extraction Task with Document Ranking | p. 317 |
4 Case Studies | p. 325 |
5 Conclusions and Discussion | p. 343 |
6 Acknowledgements | p. 344 |
References | p. 344 |
Suggested Readings | p. 346 |
Online Resources | p. 346 |
Discussion Questions | p. 346 |
Chapter 16 Data Distortion Methods and Metrics in a Terrorist Analysis SystemShuting Xu and Jun Zhang | |
Chapter Overview p. 347 | |
1 Introduction | p. 348 |
2 Terrorist Analysis System | p. 350 |
3 Data Distortion | p. 350 |
4 Data Distortion Measures | p. 354 |
5 Utility Measure | p. 357 |
6 Experiments and Results | p. 358 |
7 Conclusions and Discussions | p. 361 |
References | p. 362 |
Suggested Readings | p. 364 |
Online Resources | p. 364 |
Discussion Questions | p. 364 |
Chapter 17 Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)Yuval Elovici and Bracha Shapira and Mark Last and Omer Zaafrany and Menahem Friedman and Moti Schneider and Abraham Kandel | |
Chapter Overview p. 365 | |
1 Introduction | p. 366 |
2 Related Work | p. 367 |
3 Advanced Terrorist Detection System | p. 368 |
4 Evaluation | p. 374 |
5 Conclusions and Discussion | p. 381 |
6 Acknowledgements | p. 382 |
References | p. 382 |
Suggested Readings | p. 384 |
Online Resources | p. 384 |
Discussion Questions | p. 384 |
Chapter 18 Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-terrorism WeaponsXiaohua Hu and Xiaodan Zhang and Daniel Wu and Xiaohua Zhou and Peter Rumm | |
Chapter Overview p. 385 | |
1 Introduction | p. 386 |
2 Related Works | p. 387 |
3 Background of Virus and Bacterium | p. 387 |
4 Method | p. 389 |
5 Experimental Results | p. 394 |
6 Potential Significance for Public Health and Homeland Security | p. 404 |
7 Acknowledgements | p. 404 |
References | p. 404 |
Suggested Readings | p. 405 |
Online Resources | p. 405 |
Discussion Questions | p. 405 |
Chapter 19 Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous ContentOzgur Yilmazel and Svetlana Symonenko and Niranjan Balasubramanian and Elizabeth D. Liddy | |
Chapter Overview p. 407 | |
1 Introduction | p. 408 |
2 Overview of Related Work | p. 409 |
3 Case Study: One-class Categorization Approach to the Problem of Identifying Anomalous Content | p. 411 |
4 Conclusions and Discussion | p. 420 |
References | p. 421 |
Acknowledgements | p. 423 |
Suggested Readings | p. 423 |
Online Resources | p. 423 |
Discussion Questions | p. 423 |
Chapter 20 Individual and Collective Analysis of Anomalies in Message TrafficD.B. Skillicorn | |
Chapter Overview p. 425 | |
1 Introduction | p. 426 |
2 Analysis of Single Messages | p. 428 |
3 Analysis of Multiple Messages | p. 435 |
4 Conclusions | p. 447 |
5 Acknowledgements | p. 448 |
References | p. 448 |
Suggested Readings | p. 449 |
Discussion Questions | p. 449 |
Chapter 21 Addressing Insider Threat through Cost-Sensitive Document ClassificationYoung-Woo Seo and Katia Sycara | |
Chapter Overview p. 451 | |
1 Introduction | p. 452 |
2 Related Work | p. 454 |
3 Overview | p. 455 |
4 Classification for Confidential Authorization | p. 457 |
5 Experiments | p. 461 |
6 Conclusion | p. 468 |
7 Acknowledgments | p. 470 |
References | p. 470 |
Suggested Readings | p. 471 |
Online Resources | p. 472 |
Discussion Questions | p. 472 |
Chapter 22 Using Web Mining and Social Network Analysis to Study the Emergence of Cyber Communities in BlogsMichael Chau and Jennifer Xu | |
Chapter Overview | p. 473 |
1 Introduction | p. 474 |
2 Research Background | p. 475 |
3 Research Questions | p. 479 |
4 A Framework for Blog Collection and Analysis | p. 480 |
5 A Case Study on Xanga | p. 483 |
6 Conclusion and Future Directions | p. 488 |
7 Acknowledgements | p. 489 |
References | p. 489 |
Appendix | p. 492 |
Suggested Readings | p. 493 |
Online Resources | p. 493 |
Discussion Questions | p. 493 |
Chapter 23 Automatic Extraction of Deceptive Behavioral Cues from VideoThomas O. Meservy and Matthew L. Jensen and W. John Kruse and Judee K. Burgoon and Jay F. Nunamaker Jr. | |
Chapter Overview | p. 495 |
1 Introduction | p. 496 |
2 Literature Review | p. 496 |
3 Research Method and Examples | p. 501 |
4 Experiments and Results | p. 510 |
5 Conclusion | p. 512 |
6 Acknowledgements | p. 513 |
References | p. 513 |
Suggested Readings | p. 515 |
Online Resources | p. 515 |
Discussion Questions | p. 516 |
Chapter 24 Situational Awareness Technologies for Disaster ResponseNaveen Ashish and Ronald Eguchi and Rajesh Hegde and Charles Huyck and Dmitri Kalashnikov and Sharad Mehrotra and Padhraic Smyth and Nalini Venkatasubramanian | |
Chapter Overview | p. 517 |
1 Introduction | p. 518 |
2 Situational Awareness | p. 523 |
3 Event Extraction | p. 527 |
4 Event Data Management | p. 531 |
5 Event Analysis and Visualization | p. 534 |
6 Artifacts | p. 539 |
7 Conclusion | p. 541 |
8 Acknowledgements | p. 542 |
References | p. 543 |
Online Resources | p. 544 |
Questions for Discussion | p. 544 |
Author Index | p. 545 |
Subject Index | p. 547 |