Read more
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and they involve the collection of a mass of information from multiple sources and in numerous languages.
TERRORISM INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches.
About the author
The lead author is an editor for the IEEE Int. conference on Intelligence and Security Informatics and the founder of ISI conferences.
Summary
This book surveys the state-of-the-art of terrorism informatics, It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. It first tackles methodological issues that impact trends, achievements, root causes, and failures in terrorism research within the context of the methods of retrieving and developing, sharing, and implementing methodologies and resources. The book next details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then goes into the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.
Additional text
From the reviews:
"The title of this book might imply, at first sight, a US-centric approach to the topic, but in fact, the contributions are not only from the US, but also from Canada … India, and Israel. … A particularly good feature of this book is the back matter included at the end of each chapter: suggested readings, online resources, and discussion questions … . This edited volume should appeal to the growing terrorism informatics research community, graduate students, and readers in the wider community … ." (John Fulcher, ACM Computing Reviews, May, 2009)
Report
From the reviews:
"The title of this book might imply, at first sight, a US-centric approach to the topic, but in fact, the contributions are not only from the US, but also from Canada ... India, and Israel. ... A particularly good feature of this book is the back matter included at the end of each chapter: suggested readings, online resources, and discussion questions ... . This edited volume should appeal to the growing terrorism informatics research community, graduate students, and readers in the wider community ... ." (John Fulcher, ACM Computing Reviews, May, 2009)