Abstract
Ever since the 9–11 incident, the multidisciplinary field of terrorism has experienced tremendous growth. As the domain has benefited greatly from recent advances in information technologies, more complex and challenging new issues have emerged from numerous counter-terrorism-related research communities as well as governments of all levels. In this paper, we describe an advanced knowledge discovery approach to addressing terrorism threats. We experimented with our approach in a project called Terrorism Knowledge Discovery Project that consists of several custom-built knowledge portals. The main focus of this project is to provide advanced methodologies for analyzing terrorism research, terrorists, and the terrorized groups (victims). Once completed, the system can also become a major learning resource and tool that the general community can use to heighten their awareness and understanding of global terrorism phenomenon, to learn how best they can respond to terrorism and, eventually, to garner significant grass root support for the government’s efforts to keep America safe.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Baker, W.E., Faulkner, R.R.: Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(12), 837–860 (1993)
Boyack, K.W.: Mapping Knowledge Domains: Characterizing PNAS. PNAS Early edn. (2003)
Breiger, R.L., Boorman, S., Arabie, P.: An Algorithm for Clustering Relational Data, with Applications to Social Network Analysis and Comparison with Multidimensional Scaling. Journal of Mathematical Psychology 12, 328–383 (1975)
Carley, K.M., Lee, J.S.: Destabilizing Networks. Connections 24(3), 31–34 (2001)
Carnegie Mellon University: Web Portal and Portal Taxonomies. Final Report of Consequence Management Program Integration Office (2001)
Cateriniccha, D.: Data Mining Aims at National Security. Federal Computer Week (2002)
Center, T.R.: About the Terrorism Research Center (2003)
Chen, C., Paul, R.J., O’Keefe, B.: Fitting the jigsaw of Citation: Information Visualization in Domain Analysis. Journal of American Society of Information Science and Technology 52(4), 315–330 (2001)
Chen, H., Lynch, K.J.: Automatic Construction of Networks of Concepts Characterizing Document Databases. IEEE Transactions on Systems, Man, and Cybernetics 22(5), 885–902 (1992)
Chung, W., Zhang, Y., Huang, Z., Wang, G., Ong, T.H., Chen, H.: Internet Searching and Browsing in a Multilingual World: An Experiment on the Chinese Business Intelligence Portal (CBizPort). Journal of the American Society for Information and Science and Technology, Accepted for publication (forthcoming)
Colby, K.M.W., Sylvia, H., Dennis, F.: Artificial Paranoia. Artificial Intelligence 2, 1–25 (1971)
Council, N.R.: Making the Nation Safer: the Role of Science and Technology in Countering Terrorism, Washington, D.C., p. 339 (2002)
Crenshaw, M.: Psychology of Terrorism: An Agenda for the 21st Century. Political Psychology 21(2), 405–420 (2000)
Cutter, S., Wilbank, T.J. (eds.): Geographical Dimensions of Terrorism. Taylor & Francis, Inc., Abington (2003)
DARPA: Terrorism Knowledge Base Proposal (2002)
De Angeli, A.J., Graham, I., Coventry, L.: The Unfriendly User: Exploring Social Reactions to Chatterbots. In: Proceedings of The International Conference on Affective Human Factors Design, Asean Academic Press. Han, S. K., YounGi, London (2001)
Dijkstra, E.: A Note on Two Problems in Connection with Graphs. Numerische Mathematik 1, 269–271 (1959)
Floyd, R.W.: Algorithm 97: Shortest Path. Communications of the ACM 5(6), 345–370 (1962)
Freeman, L.C.: Centrality in Social Networks: Conceptual Clarification. Social Networks 1, 215–240 (1979)
Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice-Hall, Upper Saddle River (1988)
Kennedy, L.W., Lunn, C.M.: Developing a Foundation for Policy Relevant Terrorism Research in Criminology (2003)
Kohonen, T.: Self-organizing maps. Springer, Berlin (1995)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)
Lawrence, S., Giles, C.L.: Accessibility of Information on the Web. Nature 400, 107–109 (1999)
Lorrain, F.P., White, H.C.: Structural Equivalence of Individuals in Social Networks. Journal of Mathematical Sociology 1, 49–80 (1971)
McAndrew, D.: Structural Analysis of Criminal Networks. Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. L. Allison. Dartmouth, Aldershot (1999)
McBryan, O.: GENVL and WWW: Tools for Taming the Web. In: Proceedings of the First International Conference on the World Wide Web, Geneva, Switzerland (1994)
McDonald, D., Chen, H.: Using Sentence-selection Heuristics to Rank Text Segments in TXTRACTOR. In: Proceedings of Second ACM/IEEE-CS joint conference on Digital libraries, Portland, Oregon, USA (2002)
Moore, R.G.: Graham: Emile: Using a Chatbot Conversation to Enhance the Learning of Social Theory. Huddersfield, England, Univ. of Huddersfield (2002)
Murtagh, F.: A Survey of Recent Advances in Hierarchical Clustering Algorithms Which Use Cluster Centers. Computer Journal 26, 354–359 (1984)
National Science Foundation: Data Mining and Homeland Security Applications (2003)
Reid, E.O.F.: An Analysis of Terrorism Literature: A Bibliometric and Content Analysis Study. School of Library and Information Management. Los Angeles, University of Southern California, p. 357 (1983)
Reid, E.O.F.: Using Online Databases to Analyze the Development of a Specialty: Case Study of Terrorism. In: 13th National Online Meeting Proceedings, New York, NY, Learning Information (1992)
Reid, E.O.F.: Evolution of a Body of Knowledge: an Analysis of Terrorism Research. Information Processing & Management 33(1), 91–106 (1997)
Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Pennsylvania (2004)
Salton, G.: Recent Trends in Automatic Information Retrieval. In: Proceedings of the 9th Annual International ACM SIGIR, Pisa, Italy (1986)
Selberg, E., Etzioni, O.: Multi-service Search and Comparison Using the MetaCrawler. In: Proceedings of the 4th International World-Wide Web Conference (1995)
Silke, A.: Devil You Know: Continuing Problems with Research on Terrorism. Terrorism and Political Violence 13(4), 1–14 (2001)
Sparrow, M.K.: Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251–274 (1991)
Tolle, K.M., Chen, H.: Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science (Special Issue on Digital Libraries) 51(4), 352–370 (2000)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
Weizenbaum, J.: Eliza - A Computer Program for the Study of Natural Language Communication between Man and Machine. Communications of the ACM 9(1), 36–45 (1966)
White, H.C., Boorman, S.A., Breiger, R.L.: Social Structure from Multiple Networks: I. Blockmodels of Roles and Positions. American Journal of Sociology 81, 730–780 (1976)
Vrajitoru, D.: Evolutionary Sentence Building for Chatterbots. In: Cantú-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O’Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol. 2723, Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Reid, E. et al. (2004). Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-25952-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22125-8
Online ISBN: 978-3-540-25952-7
eBook Packages: Springer Book Archive