Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.
Author(s): Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam (auth.), Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Jenny Schroeder, Therani Madhusudan (eds.)
Series: Lecture Notes in Computer Science 2665
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 390
Tags: Information Systems Applications (incl.Internet); Computer Communication Networks; Database Management; Information Storage and Retrieval; Artificial Intelligence (incl. Robotics); Legal Aspects of Computing
CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis....Pages 168-180
A Spatio Temporal Visualizer for Law Enforcement....Pages 181-194
Tracking Hidden Groups Using Communications....Pages 195-208
Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study....Pages 209-222
“Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age....Pages 223-231
Untangling Criminal Networks: A Case Study....Pages 232-248
Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework....Pages 249-265
Collaborative Workflow Management for Interagency Crime Analysis....Pages 266-280
Using Support Vector Machines for Terrorism Information Extraction....Pages 1-12
Criminal Incident Data Association Using the OLAP Technology....Pages 13-26
Names: A New Frontier in Text Mining....Pages 27-38
Web-Based Intelligence Reports System....Pages 39-58
Authorship Analysis in Cybercrime Investigation....Pages 59-73
Behavior Profiling of Email....Pages 74-90
Detecting Deception through Linguistic Analysis....Pages 91-101
A Longitudinal Analysis of Language Behavior of Deception in E-mail....Pages 102-110
Evacuation Planning: A Capacity Constrained Routing Approach....Pages 111-125
Locating Hidden Groups in Communication Networks Using Hidden Markov Models....Pages 126-137
Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department....Pages 138-152
Decision Based Spatial Analysis of Crime....Pages 153-167
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement....Pages 281-295
Active Database Systems for Monitoring and Surveillance....Pages 296-307
Integrated “Mixed” Networks Security Monitoring — A Proposed Framework....Pages 308-321
Bioterrorism Surveillance with Real-Time Data Warehousing....Pages 322-335
Privacy Sensitive Distributed Data Mining from Multi-party Data....Pages 336-342
P ro G en IE: Biographical Descriptions for Intelligence Analysis....Pages 343-345
Scalable Knowledge Extraction from Legacy Sources with SEEK....Pages 346-349
“TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features....Pages 350-354
Emergent Semantics from Users’ Browsing Paths....Pages 355-357
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection....Pages 358-365
Training Professionals to Detect Deception....Pages 366-370
An E-mail Monitoring System for Detecting Outflow of Confidential Documents....Pages 371-374
Intelligence and Security Informatics: An Information Economics Perspective....Pages 375-378
An International Perspective on Fighting Cybercrime....Pages 379-384
Hiding Traversal of Tree Structured Data from Untrusted Data Stores....Pages 385-385
Criminal Record Matching Based on the Vector Space Model....Pages 386-386
Database Support for Exploring Criminal Networks....Pages 387-387
Hiding Data and Code Security for Application Hosting Infrastructure....Pages 388-388
Secure Information Sharing and Information Retrieval Infrastructure with GridIR....Pages 389-389
Semantic Hacking and Intelligence and Security Informatics....Pages 390-390