Skip to main content

Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3073))

Abstract

Ever since the 9–11 incident, the multidisciplinary field of terrorism has experienced tremendous growth. As the domain has benefited greatly from recent advances in information technologies, more complex and challenging new issues have emerged from numerous counter-terrorism-related research communities as well as governments of all levels. In this paper, we describe an advanced knowledge discovery approach to addressing terrorism threats. We experimented with our approach in a project called Terrorism Knowledge Discovery Project that consists of several custom-built knowledge portals. The main focus of this project is to provide advanced methodologies for analyzing terrorism research, terrorists, and the terrorized groups (victims). Once completed, the system can also become a major learning resource and tool that the general community can use to heighten their awareness and understanding of global terrorism phenomenon, to learn how best they can respond to terrorism and, eventually, to garner significant grass root support for the government’s efforts to keep America safe.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baker, W.E., Faulkner, R.R.: Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry. American Sociological Review 58(12), 837–860 (1993)

    Article  Google Scholar 

  2. Boyack, K.W.: Mapping Knowledge Domains: Characterizing PNAS. PNAS Early edn. (2003)

    Google Scholar 

  3. Breiger, R.L., Boorman, S., Arabie, P.: An Algorithm for Clustering Relational Data, with Applications to Social Network Analysis and Comparison with Multidimensional Scaling. Journal of Mathematical Psychology 12, 328–383 (1975)

    Article  Google Scholar 

  4. Carley, K.M., Lee, J.S.: Destabilizing Networks. Connections 24(3), 31–34 (2001)

    Google Scholar 

  5. Carnegie Mellon University: Web Portal and Portal Taxonomies. Final Report of Consequence Management Program Integration Office (2001)

    Google Scholar 

  6. Cateriniccha, D.: Data Mining Aims at National Security. Federal Computer Week (2002)

    Google Scholar 

  7. Center, T.R.: About the Terrorism Research Center (2003)

    Google Scholar 

  8. Chen, C., Paul, R.J., O’Keefe, B.: Fitting the jigsaw of Citation: Information Visualization in Domain Analysis. Journal of American Society of Information Science and Technology 52(4), 315–330 (2001)

    Article  Google Scholar 

  9. Chen, H., Lynch, K.J.: Automatic Construction of Networks of Concepts Characterizing Document Databases. IEEE Transactions on Systems, Man, and Cybernetics 22(5), 885–902 (1992)

    Article  Google Scholar 

  10. Chung, W., Zhang, Y., Huang, Z., Wang, G., Ong, T.H., Chen, H.: Internet Searching and Browsing in a Multilingual World: An Experiment on the Chinese Business Intelligence Portal (CBizPort). Journal of the American Society for Information and Science and Technology, Accepted for publication (forthcoming)

    Google Scholar 

  11. Colby, K.M.W., Sylvia, H., Dennis, F.: Artificial Paranoia. Artificial Intelligence 2, 1–25 (1971)

    Article  Google Scholar 

  12. Council, N.R.: Making the Nation Safer: the Role of Science and Technology in Countering Terrorism, Washington, D.C., p. 339 (2002)

    Google Scholar 

  13. Crenshaw, M.: Psychology of Terrorism: An Agenda for the 21st Century. Political Psychology 21(2), 405–420 (2000)

    Article  Google Scholar 

  14. Cutter, S., Wilbank, T.J. (eds.): Geographical Dimensions of Terrorism. Taylor & Francis, Inc., Abington (2003)

    Google Scholar 

  15. DARPA: Terrorism Knowledge Base Proposal (2002)

    Google Scholar 

  16. De Angeli, A.J., Graham, I., Coventry, L.: The Unfriendly User: Exploring Social Reactions to Chatterbots. In: Proceedings of The International Conference on Affective Human Factors Design, Asean Academic Press. Han, S. K., YounGi, London (2001)

    Google Scholar 

  17. Dijkstra, E.: A Note on Two Problems in Connection with Graphs. Numerische Mathematik 1, 269–271 (1959)

    Article  MATH  MathSciNet  Google Scholar 

  18. Floyd, R.W.: Algorithm 97: Shortest Path. Communications of the ACM 5(6), 345–370 (1962)

    Article  Google Scholar 

  19. Freeman, L.C.: Centrality in Social Networks: Conceptual Clarification. Social Networks 1, 215–240 (1979)

    Article  Google Scholar 

  20. Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice-Hall, Upper Saddle River (1988)

    MATH  Google Scholar 

  21. Kennedy, L.W., Lunn, C.M.: Developing a Foundation for Policy Relevant Terrorism Research in Criminology (2003)

    Google Scholar 

  22. Kohonen, T.: Self-organizing maps. Springer, Berlin (1995)

    Google Scholar 

  23. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)

    Google Scholar 

  24. Lawrence, S., Giles, C.L.: Accessibility of Information on the Web. Nature 400, 107–109 (1999)

    Article  Google Scholar 

  25. Lorrain, F.P., White, H.C.: Structural Equivalence of Individuals in Social Networks. Journal of Mathematical Sociology 1, 49–80 (1971)

    Article  Google Scholar 

  26. McAndrew, D.: Structural Analysis of Criminal Networks. Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling Series, III. L. Allison. Dartmouth, Aldershot (1999)

    Google Scholar 

  27. McBryan, O.: GENVL and WWW: Tools for Taming the Web. In: Proceedings of the First International Conference on the World Wide Web, Geneva, Switzerland (1994)

    Google Scholar 

  28. McDonald, D., Chen, H.: Using Sentence-selection Heuristics to Rank Text Segments in TXTRACTOR. In: Proceedings of Second ACM/IEEE-CS joint conference on Digital libraries, Portland, Oregon, USA (2002)

    Google Scholar 

  29. Moore, R.G.: Graham: Emile: Using a Chatbot Conversation to Enhance the Learning of Social Theory. Huddersfield, England, Univ. of Huddersfield (2002)

    Google Scholar 

  30. Murtagh, F.: A Survey of Recent Advances in Hierarchical Clustering Algorithms Which Use Cluster Centers. Computer Journal 26, 354–359 (1984)

    Google Scholar 

  31. National Science Foundation: Data Mining and Homeland Security Applications (2003)

    Google Scholar 

  32. Reid, E.O.F.: An Analysis of Terrorism Literature: A Bibliometric and Content Analysis Study. School of Library and Information Management. Los Angeles, University of Southern California, p. 357 (1983)

    Google Scholar 

  33. Reid, E.O.F.: Using Online Databases to Analyze the Development of a Specialty: Case Study of Terrorism. In: 13th National Online Meeting Proceedings, New York, NY, Learning Information (1992)

    Google Scholar 

  34. Reid, E.O.F.: Evolution of a Body of Knowledge: an Analysis of Terrorism Research. Information Processing & Management 33(1), 91–106 (1997)

    Article  Google Scholar 

  35. Sageman, M.: Understanding Terror Networks. University of Pennsylvania Press, Pennsylvania (2004)

    Google Scholar 

  36. Salton, G.: Recent Trends in Automatic Information Retrieval. In: Proceedings of the 9th Annual International ACM SIGIR, Pisa, Italy (1986)

    Google Scholar 

  37. Selberg, E., Etzioni, O.: Multi-service Search and Comparison Using the MetaCrawler. In: Proceedings of the 4th International World-Wide Web Conference (1995)

    Google Scholar 

  38. Silke, A.: Devil You Know: Continuing Problems with Research on Terrorism. Terrorism and Political Violence 13(4), 1–14 (2001)

    Article  Google Scholar 

  39. Sparrow, M.K.: Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251–274 (1991)

    Article  Google Scholar 

  40. Tolle, K.M., Chen, H.: Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science (Special Issue on Digital Libraries) 51(4), 352–370 (2000)

    Google Scholar 

  41. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  42. Weizenbaum, J.: Eliza - A Computer Program for the Study of Natural Language Communication between Man and Machine. Communications of the ACM 9(1), 36–45 (1966)

    Article  Google Scholar 

  43. White, H.C., Boorman, S.A., Breiger, R.L.: Social Structure from Multiple Networks: I. Blockmodels of Roles and Positions. American Journal of Sociology 81, 730–780 (1976)

    Google Scholar 

  44. Vrajitoru, D.: Evolutionary Sentence Building for Chatterbots. In: Cantú-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O’Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol. 2723, Springer, Heidelberg (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Reid, E. et al. (2004). Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25952-7_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22125-8

  • Online ISBN: 978-3-540-25952-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics