Abstract
This paper describes a novel architecture for anti-terrorism planning and resource allocation systems. The architecture uses web services and agents to provide a re-usable and extensible architecture for these types of systems. A dynamic web-based client and custom middle ware provide for the integration of otherwise de-coupled software components. The architecture has evolved from a longitudinal field study of U.S. Marine Corps anti-terrorism planners through recent empirical work in a more controlled setting. We describe this evolution, the architecture and its rationale, and provide some lessons learned for others engaged in development of anti-terrorism systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, H.: Intelligence and Security Informatics for International Security: Information Sharing and Data Mining. Springer, Heidelberg (2006)
Yen, J., Popp, R., Cybenko, G., Taipale, K.A., Sweeney, L., Rosenzweig, P.: Homeland security. IEEE Intelligent Systems 20(5) (2005)
Avant, D., Baum, M., Bertram, C., Fisher, M., Sheth, A., Warke, Y.: Semantic Technology Applications for Homeland Security. In: Proceedings of International Conference on Information and Knowledge Management (CIKM 2002), McLean, VA, pp. 611–613 (2002)
Popp, R., Poindexter, J.: Countering Terrorism through Information and Privacy Protection Technologies. IEEE Security and Privacy 4(6), 18–27 (2006)
Popp, R., Krishna, P., Willett, P., Serfaty, D., Stacy, W., Carley, K., Allanach, J., Haiying, T., Satnam, S.: Collaborative Tools for Counter-Terrorism Analysis. In: Aerospace Conference, 2005 IEEE, vol. 1 (2005)
White, G.B., DiCenso, D.J.: Information Sharing Needs for National Security. In: System Sciences, HICSS 2005. Proceedings of the 38th Annual Hawaii International Conference, p. 125c (2005)
Davies, S.: A year after 9/11: Where are we now? Communications of the ACM 45(9), 35–39 (2002)
Cohen, P.R., Greenberg, M.L., Hart, D.M., Howe, A.E.: Trial by Fire: Understanding the Design Requirements for Agents in Complex Environments. AI Magazine 10, 32–48 (1989)
Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Scientific American 284(5), 34–43 (2001)
Laird, J., Newell, A., Rosenbloom, P.: Soar: An Architecture for General Intelligence. Artificial Intelligence 33, 1–64 (1987)
Cohen, M.A., Ritter, F.E., Haynes, S.R.: Herbal: A high-level language and development environment for developing cognitive models in Soar. In: Proceedings of the 14th Conference on Behavior Representation in Modeling and Simulation, Orlando, FL, U. of Central Florida (2005)
Haynes, S.R., Kannampallil, T.G., Larson, L.L., Garg, N.: Optimizing anti-terrorism resource allocation. J. Am. Soc. Inf. Sci. Technol. 56(3), 299–309 (2005)
Fischer, G., Nakakoji, K., Ostwald, J., Stahl, G., Sumner, T.: Embedding Computer-Based Critics in the Contexts of Design. In: Human Factors in Computing Systems INTERCHI 1993, Amsterdam, Netherlands, pp. 157–164 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Haynes, S.R., Kannampallil, T.G., Cohen, M.A., Soares, A., Ritter, F.E. (2008). Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds) Intelligence and Security Informatics. EuroIsI 2008. Lecture Notes in Computer Science, vol 5376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89900-6_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-89900-6_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89899-3
Online ISBN: 978-3-540-89900-6
eBook Packages: Computer ScienceComputer Science (R0)