作者: Hsinchun Chen , Yilu Zhou , Edna F. Reid , Catherine A. Larson
DOI: 10.1007/S10796-010-9293-6
关键词:
摘要: Since September 11th, the multidisciplinary field of terrorism informatics has experienced tremendous growth, and research communities as well local, state, national governments are facing increasingly more complex challenging issues. The challenges intelligence security worldwide include accurately efficiently monitoring, analyzing, predicting preventing terrorist activities. development use advanced information technologies, including methodologies, models algorithms, infrastructure, systems, tools for national/international homeland related applications have provided promising new directions study. Terrorism been defined application fusion analysis techniques to acquire, integrate process, analyze, manage diversity terrorism-related international security-related (Chen et al. 2008). It is a highly interdisciplinary comprehensive field. wide variety methods used in derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, Public Policy, these involved collection huge amounts many types multi-lingual varied multiple sources. Information technology techniques, which data mining, integration, language translation image video processing, play central roles prevention, detection, remediation terrorism. purpose this special issue bring together researchers, engineers, policy makers, practitioners working on fields such organizational social sciences. We accepted nine papers that report informatics. They study topics networks Website sophistication, online forum Twitter, English content Chinese content. represent good mix disciplines look at different perspectives. first two provide reviews field, demand, trends. These guidelines what interests community. “Tracking Disrupting Dark Networks: Challenges Data Collection Analysis” by Roberts (Roberts 2011) within Various relevant government agencies, their ongoing projects introduced. “Computational Approaches Suspicion Adversarial Settings” Skillicorn 2011 provides computational framework adversarial context crime investigations. author reviewed discussed three major components adversary-based characteristics, detection identify suspicious individuals, network-based association find individuals known individual. next four focus web with last one also addresses structure reveal sophistication level websites. Two them source: Twitter. “Information Control H. Chen Management Systems, University Arizona, Tucson, AZ, USA