Introduction to special issue on terrorism informatics
نویسندگان
چکیده
Since September 11th, the multidisciplinary field of terrorism informatics has experienced tremendous growth, and research communities as well as local, state, and national governments are facing increasingly more complex and challenging issues. The challenges facing the intelligence and national security communities worldwide include accurately and efficiently monitoring, analyzing, predicting and preventing terrorist activities. The development and use of advanced information technologies, including methodologies, models and algorithms, infrastructure, systems, and tools for national/international and homeland security related applications have provided promising new directions for study. Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications (Chen et al. 2008). It is a highly interdisciplinary and comprehensive field. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy, and these methods are involved in the collection of huge amounts of many types of multi-lingual information from varied and multiple sources. Information fusion and information technology analysis techniques, which include data mining, data integration, language translation technologies, and image and video processing, play central roles in the prevention, detection, and remediation of terrorism. The purpose of this special issue is to bring together international researchers, engineers, policy makers, and practitioners working on terrorism informatics as well as related fields such as the organizational and social sciences. We have accepted nine papers that report research in terrorism informatics. They study a variety of topics from terrorist social networks to terrorist Website sophistication, from online forum to Twitter, and from English content to Chinese content. They represent a good mix of multiple disciplines and look at terrorism informatics from different perspectives. The first two papers provide comprehensive reviews of the field, demand, techniques and trends. These papers provide guidelines as what are the interests and challenges in this community. “Tracking and Disrupting Dark Networks: Challenges of Data Collection and Analysis” by Roberts (Roberts 2011) provide challenges of data collection and analysis from within the intelligence community. Various relevant government agencies, their research interests and their ongoing projects on terrorism information collection and analysis are introduced. “Computational Approaches to Suspicion in Adversarial Settings” by Skillicorn 2011 provides a computational framework for adversarial data analysis in the context of crime and terrorism investigations. The author reviewed and discussed three major components including adversary-based data collection and characteristics, the detection techniques that identify suspicious individuals, and the network-based association techniques that find individuals related to a known suspicious individual. The next four papers focus on web content analysis with the last one also addresses web structure analysis to reveal sophistication level of terrorist websites. Two of them look at a new and promising data source: Twitter. “Information Control H. Chen Management Information Systems, University of Arizona, Tucson, AZ, USA
منابع مشابه
New frontiers of terrorism research: An introduction
This article opens the special issue by identifying themain contributions to date of the empirical and theoretical literature on terrorism. Important past theoretical articles investigated the application of game theory to study interactions among adversaries (e.g. terrorists and governments) and allies (e.g. commonly targeted governments). Past empirical articles examined the effectiveness of ...
متن کاملAggression and Crime. An Introduction to a Hot-Topic
This special hot-topic issue arose from a symposium at the IV CICA-STR International Conference held in Cartagena de Indias (Colombia) in 2010, dealing on “Aggression, Political Violence, and Terrorism”. In order to put the symposium within the general frame of the conference, the issue starts with the opening words of its Chairman, focused at some important general topics related to aggression...
متن کاملIntroduction to This Special Issue on the Lived Experience of Personal Informatics
Introduction to This Special Issue on the Lived Experience of Personal Informatics Dan Cosley, Elizabeth Churchill, Jodi Forlizzi & Sean A. Munson To cite this article: Dan Cosley, Elizabeth Churchill, Jodi Forlizzi & Sean A. Munson (2017) Introduction to This Special Issue on the Lived Experience of Personal Informatics, Human– Computer Interaction, 32:5-6, 197-207, DOI: 10.1080/07370024.2017....
متن کاملTerrorism and Policy: Introduction
This article sets the stage for the special issue by indicating the current focus in the literature on applying analytical tools to enlighten policy makers in the practice of counterterrorism in the post-9/11 era. In particular, the article briefly indicates the main areas of recent work. The article also introduces some key concepts. Next, the article highlights the methodology and main contri...
متن کاملIsrael Advocacy in the Academic Field: The Case of Terrorism Studies
Research on the special relationship between the United States and Israel hasusually been focused on strategic aspects, whilst fewer scholars have focusedon non-material dimensions of the relationship. In addition, the existingresearch is mostly confined to the political and decision-making realms, withvery few excursions into the academic arena. The current article aims...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Systems Frontiers
دوره 13 شماره
صفحات -
تاریخ انتشار 2011