Matches in SemOpenAlex for { <https://semopenalex.org/work/W2014985920> ?p ?o ?g. }
Showing items 1 to 67 of
67
with 100 items per page.
- W2014985920 endingPage "3" @default.
- W2014985920 startingPage "1" @default.
- W2014985920 abstract "Since September 11th, the multidisciplinary field of terrorism informatics has experienced tremendous growth, and research communities as well as local, state, and national governments are facing increasingly more complex and challenging issues. The challenges facing the intelligence and national security communities worldwide include accurately and efficiently monitoring, analyzing, predicting and preventing terrorist activities. The development and use of advanced information technologies, including methodologies, models and algorithms, infrastructure, systems, and tools for national/international and homeland security related applications have provided promising new directions for study. Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications (Chen et al. 2008). It is a highly interdisciplinary and comprehensive field. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy, and these methods are involved in the collection of huge amounts of many types of multi-lingual information from varied and multiple sources. Information fusion and information technology analysis techniques, which include data mining, data integration, language translation technologies, and image and video processing, play central roles in the prevention, detection, and remediation of terrorism. The purpose of this special issue is to bring together international researchers, engineers, policy makers, and practitioners working on terrorism informatics as well as related fields such as the organizational and social sciences. We have accepted nine papers that report research in terrorism informatics. They study a variety of topics from terrorist social networks to terrorist Website sophistication, from online forum to Twitter, and from English content to Chinese content. They represent a good mix of multiple disciplines and look at terrorism informatics from different perspectives. The first two papers provide comprehensive reviews of the field, demand, techniques and trends. These papers provide guidelines as what are the interests and challenges in this community. “Tracking and Disrupting Dark Networks: Challenges of Data Collection and Analysis” by Roberts (Roberts 2011) provide challenges of data collection and analysis from within the intelligence community. Various relevant government agencies, their research interests and their ongoing projects on terrorism information collection and analysis are introduced. “Computational Approaches to Suspicion in Adversarial Settings” by Skillicorn 2011 provides a computational framework for adversarial data analysis in the context of crime and terrorism investigations. The author reviewed and discussed three major components including adversary-based data collection and characteristics, the detection techniques that identify suspicious individuals, and the network-based association techniques that find individuals related to a known suspicious individual. The next four papers focus on web content analysis with the last one also addresses web structure analysis to reveal sophistication level of terrorist websites. Two of them look at a new and promising data source: Twitter. “Information Control H. Chen Management Information Systems, University of Arizona, Tucson, AZ, USA" @default.
- W2014985920 created "2016-06-24" @default.
- W2014985920 creator A5017102020 @default.
- W2014985920 creator A5041913811 @default.
- W2014985920 creator A5065281677 @default.
- W2014985920 creator A5068602497 @default.
- W2014985920 date "2011-01-13" @default.
- W2014985920 modified "2023-10-16" @default.
- W2014985920 title "Introduction to special issue on terrorism informatics" @default.
- W2014985920 cites W1979285701 @default.
- W2014985920 cites W1986581064 @default.
- W2014985920 cites W1987222412 @default.
- W2014985920 cites W2009162160 @default.
- W2014985920 cites W2025212945 @default.
- W2014985920 cites W2037781503 @default.
- W2014985920 cites W2054549097 @default.
- W2014985920 cites W2067084957 @default.
- W2014985920 cites W2036951196 @default.
- W2014985920 doi "https://doi.org/10.1007/s10796-010-9293-6" @default.
- W2014985920 hasPublicationYear "2011" @default.
- W2014985920 type Work @default.
- W2014985920 sameAs 2014985920 @default.
- W2014985920 citedByCount "6" @default.
- W2014985920 countsByYear W20149859202012 @default.
- W2014985920 countsByYear W20149859202015 @default.
- W2014985920 countsByYear W20149859202017 @default.
- W2014985920 countsByYear W20149859202020 @default.
- W2014985920 countsByYear W20149859202022 @default.
- W2014985920 crossrefType "journal-article" @default.
- W2014985920 hasAuthorship W2014985920A5017102020 @default.
- W2014985920 hasAuthorship W2014985920A5041913811 @default.
- W2014985920 hasAuthorship W2014985920A5065281677 @default.
- W2014985920 hasAuthorship W2014985920A5068602497 @default.
- W2014985920 hasBestOaLocation W20149859201 @default.
- W2014985920 hasConcept C17744445 @default.
- W2014985920 hasConcept C191630685 @default.
- W2014985920 hasConcept C199539241 @default.
- W2014985920 hasConcept C203133693 @default.
- W2014985920 hasConcept C2522767166 @default.
- W2014985920 hasConcept C41008148 @default.
- W2014985920 hasConceptScore W2014985920C17744445 @default.
- W2014985920 hasConceptScore W2014985920C191630685 @default.
- W2014985920 hasConceptScore W2014985920C199539241 @default.
- W2014985920 hasConceptScore W2014985920C203133693 @default.
- W2014985920 hasConceptScore W2014985920C2522767166 @default.
- W2014985920 hasConceptScore W2014985920C41008148 @default.
- W2014985920 hasIssue "1" @default.
- W2014985920 hasLocation W20149859201 @default.
- W2014985920 hasOpenAccess W2014985920 @default.
- W2014985920 hasPrimaryLocation W20149859201 @default.
- W2014985920 hasRelatedWork W1864137899 @default.
- W2014985920 hasRelatedWork W1982762724 @default.
- W2014985920 hasRelatedWork W2044191049 @default.
- W2014985920 hasRelatedWork W2057840278 @default.
- W2014985920 hasRelatedWork W2121784101 @default.
- W2014985920 hasRelatedWork W2166934660 @default.
- W2014985920 hasRelatedWork W2576729076 @default.
- W2014985920 hasRelatedWork W2887966400 @default.
- W2014985920 hasRelatedWork W2945472933 @default.
- W2014985920 hasRelatedWork W3088527119 @default.
- W2014985920 hasVolume "13" @default.
- W2014985920 isParatext "false" @default.
- W2014985920 isRetracted "false" @default.
- W2014985920 magId "2014985920" @default.
- W2014985920 workType "article" @default.