Chen, Hsinchun

Terrorism Informatics

Chen, Hsinchun - Terrorism Informatics, ebook


Ebook, PDF with Adobe DRM
ISBN: 9780387716138
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

I. Methodological Issues in Terrorism Research

1. Domain Mapping of Contemporary Terrorism Research
Edna Reid, Hsinchun Chen

2. Research on Terrorism
Andrew Silke

3. Who Are the Key Figures in ‘Terrorism Studies’?
Sam Raphael

4. Interviewing Terrorists
John Horgan

5. Resolving a Terrorist Insurgency by Addressing Its Root Causes
Joshua Sinai

6. A Quantitative Analysis of ‘Root Causes of Conflict’
Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best

7. Countering Terrorism with Knowledge
James O. Ellis

8. Toward a Target-specific Method of Threat Assessment
Yael Shahar

9. Identifying and Exploiting Group Learning Patterns for Counterterrorism
Horacio R. Trujillo, Brian A. Jackson

10. Homeland Insecurity
Stephen E. Fienberg

II. Terrorism Informatics to Support Prevention, Detection, and Response

11. Case Study of Jihad on the Web
Hsinchun Chen, Jialun Qin, Edna Reid, Yilu Zhou, Marc Sageman

12. Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System
Hsinchun Chen, Jialun Qin, Edna Reid, Yilu Zhou

13. Content Analysis of Jihadi Extremist Groups' Videos
Arab Salem, Edna Reid, Hsinchun Chen

14. Analysis of Affect Intensities in Extremist Group Forums
Ahmed Abbasi, Hsinchun Chen

15. Document Selection for Extracting Entity and Relationship Instances of Terrorist Events
Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Maggy Anastasia Suryanto, Rohan Kumar Gunaratna

16. Data Distortion Methods and Metrics in a Terrorist Analysis System
Shuting Xu, Jun Zhang

17. Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel

18. Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons
Xiaohua Hu, Xiaodan Zhang, Daniel Wu, Xiaohua Zhou, Peter Rumm

19. Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy

20. Individual and Collective Analysis of Anomalies in Message Traffic
D. B. Skillicorn

21. Addressing Insider Threat through Cost-Sensitive Document Classification
Young-Woo Seo, Katia Sycara

22. Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs
Michael Chau, Jennifer Xu

23. Automatic Extraction of Deceptive Behavioral Cues from Video
Thomas O. Meservy, Matthew L. Jensen, W. John Kruse, Judee K. Burgoon, Jay F. Nunamaker

24. Situational Awareness Technologies for Disaster Response
Naveen Ashish, Ronald Eguchi, Rajesh Hegde, Charles Huyck, Dmitri Kalashnikov, Sharad Mehrotra, Padhraic Smyth, Nalini Venkatasubramanian

Keywords: Economics/Management Science, Business Information Systems, Data Structures, Cryptology and Information Theory, Information Systems and Communication Service, Electronic Commerce/e-business, Political Science

Publication year
Integrated Series In Information Systems
Page amount
600 pages

Similar titles