Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism

Ever since the 9–11 incident, the multidisciplinary field of terrorism has experienced tremendous growth. As the domain has benefited greatly from recent advances in information technologies, more complex and challenging new issues have emerged from numerous counter-terrorism-related research communities as well as governments of all levels. In this paper, we describe an advanced knowledge discovery approach to addressing terrorism threats. We experimented with our approach in a project called Terrorism Knowledge Discovery Project that consists of several custom-built knowledge portals. The main focus of this project is to provide advanced methodologies for analyzing terrorism research, terrorists, and the terrorized groups (victims). Once completed, the system can also become a major learning resource and tool that the general community can use to heighten their awareness and understanding of global terrorism phenomenon, to learn how best they can respond to terrorism and, eventually, to garner significant grass root support for the government’s efforts to keep America safe.

[1]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[2]  Oliver A. McBryan,et al.  GENVL and WWWW: Tools for taming the Web , 1994, WWW Spring 1994.

[3]  Kenneth Mark Colby,et al.  Artificial Paranoia , 1975, Artif. Intell..

[4]  S. Boorman,et al.  Social structure from multiple networks: I , 1976 .

[5]  Anil K. Jain,et al.  Algorithms for Clustering Data , 1988 .

[6]  Oren Etzioni,et al.  Multi-Service Search and Comparison Using the MetaCrawler , 1995 .

[7]  D. Mcandrew The Structural Analysis of Criminal Networks , 2021, The Social Psychology of Crime.

[8]  H. White,et al.  STRUCTURAL EQUIVALENCE OF INDIVIDUALS IN SOCIAL NETWORKS , 1977 .

[9]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[10]  Oren Etzioni,et al.  Multi-Engine Search and Comparison Using the MetaCrawler , 1995, World Wide Web J..

[11]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[12]  Antonella De Angeli,et al.  The unfriendly user: exploring social reactions to chatterbots , 2001 .

[13]  Ray J. Paul,et al.  Fitting the jigsaw of citation: Information visualization in domain analysis , 2001, J. Assoc. Inf. Sci. Technol..

[14]  E. Cohen Making the Nation Safer: The Role of Science and Technology in Countering Terrorism , 2002 .

[15]  Hsinchun Chen,et al.  Comparing noun phrasing techniques for use with medical digital library tools , 2000 .

[16]  Hsinchun Chen,et al.  Using sentence-selection heuristics to rank text segments in TXTRACTOR , 2002, JCDL '02.

[17]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[18]  P. Arabie,et al.  An algorithm for clustering relational data with applications to social network analysis and comparison with multidimensional scaling , 1975 .

[19]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[20]  S. Boorman,et al.  Social Structure from Multiple Networks. I. Blockmodels of Roles and Positions , 1976, American Journal of Sociology.

[21]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[22]  W. Baker,et al.  THE SOCIAL ORGANIZATION OF CONSPIRACY: ILLEGAL NETWORKS IN THE HEAVY ELECTRICAL EQUIPMENT INDUSTRY* , 1993 .

[23]  Kevin W Boyack,et al.  Mapping knowledge domains: Characterizing PNAS , 2004, Proceedings of the National Academy of Sciences of the United States of America.

[24]  Gang Wang,et al.  Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort) , 2004, J. Assoc. Inf. Sci. Technol..

[25]  Gerard Salton,et al.  Recent trends in automatic information retrieval , 1986, SIGIR '86.

[26]  E. O. F. Reid,et al.  Evolution of a Body of Knowledge: An Analysis of Terrorism Research , 1997, Inf. Process. Manag..

[27]  A. Silke The Devil You Know: Continuing Problems with Research on Terrorism , 2001 .

[28]  Fionn Murtagh,et al.  A Survey of Recent Advances in Hierarchical Clustering Algorithms , 1983, Comput. J..

[29]  K. J. Lynch,et al.  Automatic construction of networks of concepts characterizing document databases , 1992, IEEE Trans. Syst. Man Cybern..

[30]  C. Lee Giles,et al.  Accessibility of information on the Web , 2000, INTL.

[31]  Martha Crenshaw,et al.  The Psychology of Terrorism: An Agenda for the 21st Century , 2000 .

[32]  Destabilizing networks , 2002 .

[33]  Joseph Weizenbaum,et al.  and Machine , 1977 .