Introduction to special issue on terrorism informatics

作者: Hsinchun Chen , Yilu Zhou , Edna F. Reid , Catherine A. Larson

DOI: 10.1007/S10796-010-9293-6

关键词:

摘要: Since September 11th, the multidisciplinary field of terrorism informatics has experienced tremendous growth, and research communities as well local, state, national governments are facing increasingly more complex challenging issues. The challenges intelligence security worldwide include accurately efficiently monitoring, analyzing, predicting preventing terrorist activities. development use advanced information technologies, including methodologies, models algorithms, infrastructure, systems, tools for national/international homeland related applications have provided promising new directions study. Terrorism been defined application fusion analysis techniques to acquire, integrate process, analyze, manage diversity terrorism-related international security-related (Chen et al. 2008). It is a highly interdisciplinary comprehensive field. wide variety methods used in derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, Public Policy, these involved collection huge amounts many types multi-lingual varied multiple sources. Information technology techniques, which data mining, integration, language translation image video processing, play central roles prevention, detection, remediation terrorism. purpose this special issue bring together researchers, engineers, policy makers, practitioners working on fields such organizational social sciences. We accepted nine papers that report informatics. They study topics networks Website sophistication, online forum Twitter, English content Chinese content. represent good mix disciplines look at different perspectives. first two provide reviews field, demand, trends. These guidelines what interests community. “Tracking Disrupting Dark Networks: Challenges Data Collection Analysis” by Roberts (Roberts 2011) within Various relevant government agencies, their ongoing projects introduced. “Computational Approaches Suspicion Adversarial Settings” Skillicorn 2011 provides computational framework adversarial context crime investigations. author reviewed discussed three major components adversary-based characteristics, detection identify suspicious individuals, network-based association find individuals known individual. next four focus web with last one also addresses structure reveal sophistication level websites. Two them source: Twitter. “Information Control H. Chen Management Systems, University Arizona, Tucson, AZ, USA

参考文章(10)
B. Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security Springer Publishing Company, Incorporated. ,(2008)
Daniel Zeng, Donghua Wei, Michael Chau, Feiyue Wang, Domain-specific Chinese word segmentation using suffix tree and mutual information Information Systems Frontiers. ,vol. 13, pp. 115- 125 ,(2011) , 10.1007/S10796-010-9278-5
Jiexun Li, G. Alan Wang, Hsinchun Chen, Identity matching using personal and social identity features Information Systems Frontiers. ,vol. 13, pp. 101- 113 ,(2011) , 10.1007/S10796-010-9270-0
Nancy C. Roberts, Tracking and disrupting dark networks: Challenges of data collection and analysis Information Systems Frontiers. ,vol. 13, pp. 5- 19 ,(2011) , 10.1007/S10796-010-9271-Z
Jialun Qin, Yilu Zhou, Hsinchun Chen, A multi-region empirical study on the internet presence of global extremist organizations Information Systems Frontiers. ,vol. 13, pp. 75- 88 ,(2011) , 10.1007/S10796-010-9277-6
Stephen C. Hayne, Lucy J. Troup, Sara A. McComb, Where's Farah?: Knowledge silos and information fusion by distributed collaborating teams Information Systems Frontiers. ,vol. 13, pp. 89- 100 ,(2011) , 10.1007/S10796-010-9274-9
Sheryl Prentice, Paul J. Taylor, Paul Rayson, Andrew Hoskins, Ben O’Loughlin, Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict Information Systems Frontiers. ,vol. 13, pp. 61- 73 ,(2011) , 10.1007/S10796-010-9272-Y
David B. Skillicorn, Computational approaches to suspicion in adversarial settings Information Systems Frontiers. ,vol. 13, pp. 21- 31 ,(2011) , 10.1007/S10796-010-9279-4
Onook Oh, Manish Agrawal, H. Raghav Rao, Information control and terrorism: Tracking the Mumbai terrorist attack through twitter Information Systems Frontiers. ,vol. 13, pp. 33- 43 ,(2011) , 10.1007/S10796-010-9275-8