Skip to main content

Multi-document Summarization for Terrorism Information Extraction

  • Conference paper
Intelligence and Security Informatics (ISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Included in the following conference series:

Abstract

Counterterrorism is one of the major challenges to the society. In order to flight again the terrorists, it is very important to have a through understanding of the terrorism incidents. However, it is impossible for a human to read all the information related to a terrorism incident because of the large volume of information. Summarization technique is urgently required for analysis of terrorism incident. In this work, we propose a multi-document summarization system to extract the critical information from terrorism incidents. News stories of a terrorism incident are organized into a hierarchical tree structure. Fractal summarization model is employed to generate a summary for all the news stories. Experimental results show that our system can effectively extract the most important information for the incident.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Endres-Niggemeyer, B., et al.: How to implement a naturalistic model of abstracting: Four core working steps of an expert abstractor. Info. Proc. & Manag. 31(5), 631–674 (1995)

    Article  Google Scholar 

  2. Glaser, B.G., et al.: The discovery of grounded theory. Aldine de Gruyter, New York (1967)

    Google Scholar 

  3. Hearst, M.: Subtopic structuring for full-length document access. In: SIGIR 1993, pp. 56–68 (1993)

    Google Scholar 

  4. Koike, H.: Fractal Views: A fractal-based method for controlling information display. ACM Tran. on Information Systems 13(3), 305–323 (1995)

    Article  Google Scholar 

  5. Kupiec, J., et al.: A trainable document summarizer. In: SIGIR 1995, pp. 68–73 (1995)

    Google Scholar 

  6. Luhn, H.P.: The automatic creation of literature abstracts. IBM J R&D, 159–165 (1958)

    Google Scholar 

  7. McKeown, K.R., et al.: Columbia multidocument summarization: Approach and evaluation. In: Document Understanding Conference, DUC 2001 (2001)

    Google Scholar 

  8. McKeown, K.R., et al.: Tracking and summarizing news on a daily basis with columbia’s newsblaster. In: Human Language Technology Conference (2002)

    Google Scholar 

  9. Nobata, C., et al.: A summarization system with categorization of document sets. In: Third NTCIR Workshop (2003)

    Google Scholar 

  10. Nomoto, T., et al.: A new approach to unsupervised text summarization. In: SIGIR 2001 (2001)

    Google Scholar 

  11. Yang, C.C., et al.: Fractal summarization: Summarization based on fractal theory. In: SIGIR 2003, Toronto (2003)

    Google Scholar 

  12. Yang, Y., et al.: Learning approaches for detecting and tracking news events. In: Intelligent Information Retrieval, pp. 32–43 (July 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, F.L., Yang, C.C., Shi, X. (2006). Multi-document Summarization for Terrorism Information Extraction. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_64

Download citation

  • DOI: https://doi.org/10.1007/11760146_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics