Domain Mapping of Contemporary Terrorism Research

  • Edna Reid
  • Hsinchun Chen
Part of the Integrated Series In Information Systems book series (ISIS, volume 18)

Mapping a domain involves mining, analyzing, charting, and visualizing a research area according to experts, institutions, topics, publications, and social networks. This chapter presents an overview of contemporary terrorism research by applying domain visualization techniques to the literature and author citation data from the years 1965 to 2003. The data were gathered from ten databases such as the ISI Web of Science then analyzed using an integrated knowledge mapping framework that includes selected techniques such as self-organizing map (SOM), content map analysis, and co-citation analysis. The analysis revealed (1) 42 key terrorism researchers and their institutional affiliations; (2) their influential publications; (3) a shift from focusing on terrorism as a low-intensity conflict to an emphasis on it as a strategic threat to world powers with increased focus on Osama Bin Laden; and (4) clusters of terrorism researchers who work in similar research areas as identified by co-citation and block-modeling maps.


Political Violence Terrorism Research Political Terrorism Contemporary Terrorism Terrorism Researcher 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Andrews, J.E., Author Co-citation Analysis of Medical Informatics. Journal of the Medical Library Association, 2003. 91(1): p. 47-56.Google Scholar
  2. 2.
    Bergen, P., Holy War, Inc.: Inside the Secret World of Osama Bin Laden. 2001, New York: Free Press.Google Scholar
  3. 3.
    Borgman, C.L. and J. Furner, Scholarly Communication and Bibliometrics, in Annual Review of Information Science and Technology (ARIST). 2002, ASIST.Google Scholar
  4. 4.
    Boyack, K.W. and K. Borner, Indicator-assisted Evaluation and Funding of Research: Visualizing the Influence of Grants on the Number and Citation Counts of Research Paper. Journal of the American Society of Information Science and Technology (JASIST), 2002.Google Scholar
  5. 5.
    Boyack, K.W., Mapping Knowledge Domains: Characterizing PNAS. Arthur M. Sackler Colloquium of the National Academy of Sciences, 2003, NAS: Irvine.Google Scholar
  6. 6.
    Brandes, U. and T. Willhalm. Visualization of Bibliographic Networks with a Reshaped Landscape Metaphor. In International Conference on Information Visualization. 2002: Konstanzer Schriften in Mathematik und Informatik.Google Scholar
  7. 7.
    Chen, C. and R.J. Paul, Visualizing a Knowledge Domain's Intellectual Structure. IEEE Computer Society, 2001. 34(3): p. 65-71.Google Scholar
  8. 8.
    Chen, H., et al., Crime Data Mining: a General Framework and Some Examples. IEEE Computer Society, 2004: p. 50-56.Google Scholar
  9. 9.
    Chua, C., et al., Measuring Researcher-Production in Information Systems. Journal of the Association for Information Systems, 2002. 2: p. 146-215.Google Scholar
  10. 10.
    Cronin, B., High-Fidelity Mapping of Intellectual Space: Early and Recent Insights from Information Science, in Spaces, Spatiality and Technology Workshop. 2002, Napier University, Edinburgh Scotland: Edinburgh.Google Scholar
  11. 11.
    Eggers, S., et al., Mapping Medical Informatics Research. In Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer Science, 2006.Google Scholar
  12. 12.
    Ferligoj, A., P. Doreian, and V. Batagelj, Optimizational Approach to Blockmodeling, 1992.Google Scholar
  13. 13.
    Garfield, E. and Welljams-Dorof, Citation Data: their Use as Quantitative Indicators for Science and Technology Evaluation and Policy-making. Science & Public Policy, 1992. 19 (5): p. 321-327.Google Scholar
  14. 14.
    Garfield, E., A.I. Pudovkin, and V.S. Istomin, Algorithmic Citation-Linked Historiography: Mapping the Literature of Science, in ASIST 2002 Contributed Paper. 2002.Google Scholar
  15. 15.
    Gordon, A., Terrorism Dissertations and the Evolution of a Specialty: an Analysis of Meta-Information. Terrorism and Political Violence, 1999. 11(2): p. 141-150.Google Scholar
  16. 16.
    Gordon, A., Effect of Database and Website Inconstancy on the Terrorism Field's Delineation. Studies in Conflict & Terrorism, 2004. 27: p. 79-88.CrossRefGoogle Scholar
  17. 17.
    Huang, Z., et al., International Nanotechnology Development in 2003: Country, Institution, and Technology Field Analysis Based on USPTO Patent Database. 2003.Google Scholar
  18. 18.
    Hughes, G., Analyze This, The Age. 2003.Google Scholar
  19. 19.
    Incites, Citation Thresholds. 2003, Institute for Scientific Information (ISI): Philadelphia.Google Scholar
  20. 20.
    ISI, How Does ISI identify Highly Cited Researchers? 2003, Institute for Scientific Information (ISI): Philadephia.Google Scholar
  21. 21.
    Kennedy, L.W. and C.M. Lum, Developing a Foundation for Policy Relevant Terrorism Research in Criminology. 2003, Rutgers University: New Brunswick.Google Scholar
  22. 22.
    Krebs, V.E., Uncloaking Terrorist Networks. First Monday, 2002. 7(4).Google Scholar
  23. 23.
    Lin, X., H.D. White, and J. Buzydlowski. AuthorLink: Instant Author Co-citation Mapping for Online Searching. in National Online Proceedings 2001. 2001. New York City: Information Today.Google Scholar
  24. 24.
    McCain, K.W., Mapping Authors in Intellectual Space: a Technical Overview. Journal of the American Society of Information Science, 1990. 41(6).Google Scholar
  25. 25.
    NameBase, Public Information Research, Inc.: San Antonio.
  26. 26.
    Reid, E.O.F. and H. Chen, Contemporary Terrorism Researchers' Patterns of Collaboration and Influence. (unpublished).Google Scholar
  27. 27.
    Reid, E.O.F., Analysis of Terrorism Literature: a Bibliometric and Content Analysis Study. 1983, University of Southern California: Los Angeles.Google Scholar
  28. 28.
    Reid, E.O.F., Evolution of a Body of Knowledge: an Analysis of Terrorism Research. Information Processing & Management, 1997. 33(1): p. 91-106.CrossRefGoogle Scholar
  29. 29.
    Reid, E., et al. Terrorism Knowledge Discovery Project: a Knowledge Discovery Approach to Addressing the Threats of Terrorism. In Second Symposium on Intelligence and Security Informatics, ISI 2004, June 2004 Proceedings. 2004. Tucson, Arizona: Springer-Verlag.Google Scholar
  30. 30.
    Reid, E.O.F. Identifying a Company's Non-Customer Online Communities. In Proceedings of the 36th International Conference on Systems Sciences (HICSS). 2004. Hawaii: HICSS.Google Scholar
  31. 31.
    Schmid, A. and A. Jongman, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature. 1988, Oxford: North Holland.Google Scholar
  32. 32.
    Shiffrin, R.M. and K. Borner, Mapping Knowledge Domains, in Arthur M. Sackler Colloquium of the National Academy of Sciences. Held May 9-11, 2003, at the Arnold & Mabel Beckman Center of the National Academies of Sciences & Engineering, Irvine, CA, NAS: Washington, D.C.Google Scholar
  33. 33.
    White, H.D. and K.W. McCain, Visualizing a Discipline: an Author Co-citation Analysis of Information Science 1972-1995. Journal of the American Society of Information Science, 1998. 49(4): p. 327-355.Google Scholar
  34. 34.
    White, H.D., X. Lin, and J. Buzydlowski. Co-cited Author Maps as Real-time Interfaces for Web-based Document Retrieval in the Humanities. In Joint International Conference o the Association for Computers and the Humanities and the Association for Literary and Linguistics Computing (ALLC). 2001. New York City: ACH/ALLC.Google Scholar
  35. 35.
    White, H.D., X. Lin, and J. Buzydlowski, Associative Information Visualizer, in Paper for InfoVis 2004 Contest. 2004.Google Scholar
  36. 36.
    Wilkinson, P. Terrorism: Implications for World Peace. In General Meeting Preparing for Peace Initiative. 2003. United Kingdom: Westermorland.Google Scholar
  37. 37.
    Xu, J., E. Reid, and H. Chen, Finding Communities in Related Networks. (unpublished paper)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Edna Reid
    • 1
  • Hsinchun Chen
    • 2
  1. 1.Clarion UniversityClarionUSA
  2. 2.University of ArizonaTucsonUSA

Personalised recommendations