Chen, Hsinchun
Terrorism Informatics
I. Methodological Issues in Terrorism Research
1. Domain Mapping of Contemporary Terrorism Research
Edna Reid, Hsinchun Chen
2. Research on Terrorism
Andrew Silke
3. Who Are the Key Figures in ‘Terrorism Studies’?
Sam Raphael
4. Interviewing Terrorists
John Horgan
5. Resolving a Terrorist Insurgency by Addressing Its Root Causes
Joshua Sinai
6. A Quantitative Analysis of ‘Root Causes of Conflict’
Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best
7. Countering Terrorism with Knowledge
James O. Ellis
8. Toward a Target-specific Method of Threat Assessment
Yael Shahar
9. Identifying and Exploiting Group Learning Patterns for Counterterrorism
Horacio R. Trujillo, Brian A. Jackson
10. Homeland Insecurity
Stephen E. Fienberg
II. Terrorism Informatics to Support Prevention, Detection, and Response
11. Case Study of Jihad on the Web
Hsinchun Chen, Jialun Qin, Edna Reid, Yilu Zhou, Marc Sageman
12. Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System
Hsinchun Chen, Jialun Qin, Edna Reid, Yilu Zhou
13. Content Analysis of Jihadi Extremist Groups' Videos
Arab Salem, Edna Reid, Hsinchun Chen
14. Analysis of Affect Intensities in Extremist Group Forums
Ahmed Abbasi, Hsinchun Chen
15. Document Selection for Extracting Entity and Relationship Instances of Terrorist Events
Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Maggy Anastasia Suryanto, Rohan Kumar Gunaratna
16. Data Distortion Methods and Metrics in a Terrorist Analysis System
Shuting Xu, Jun Zhang
17. Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel
18. Text Mining the Biomedical Literature for Identification of Potential Virus/Bacterium as Bio-Terrorism Weapons
Xiaohua Hu, Xiaodan Zhang, Daniel Wu, Xiaohua Zhou, Peter Rumm
19. Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy
20. Individual and Collective Analysis of Anomalies in Message Traffic
D. B. Skillicorn
21. Addressing Insider Threat through Cost-Sensitive Document Classification
Young-Woo Seo, Katia Sycara
22. Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs
Michael Chau, Jennifer Xu
23. Automatic Extraction of Deceptive Behavioral Cues from Video
Thomas O. Meservy, Matthew L. Jensen, W. John Kruse, Judee K. Burgoon, Jay F. Nunamaker
24. Situational Awareness Technologies for Disaster Response
Naveen Ashish, Ronald Eguchi, Rajesh Hegde, Charles Huyck, Dmitri Kalashnikov, Sharad Mehrotra, Padhraic Smyth, Nalini Venkatasubramanian
Keywords: Economics/Management Science, Business Information Systems, Data Structures, Cryptology and Information Theory, Information Systems and Communication Service, Electronic Commerce/e-business, Political Science
- Author(s)
- Chen, Hsinchun
- Ganor, Boaz
- Reid, Edna
- Silke, Andrew
- Sinai, Joshua
- Publisher
- Springer
- Publication year
- 2008
- Language
- en
- Edition
- 1
- Series
- Integrated Series In Information Systems
- Page amount
- 600 pages
- Category
- Economy
- Format
- Ebook
- eISBN (PDF)
- 9780387716138