Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to “medical informatics” and “bioinf- matics,” that there is a pressing need to develop the science of “intelligence and security informatics” – the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active “intelligence and security informatics” research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.

Author(s): Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam (auth.), Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Jenny Schroeder, Therani Madhusudan (eds.)
Series: Lecture Notes in Computer Science 2665
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 390
Tags: Information Systems Applications (incl.Internet); Computer Communication Networks; Database Management; Information Storage and Retrieval; Artificial Intelligence (incl. Robotics); Legal Aspects of Computing

CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis....Pages 168-180
A Spatio Temporal Visualizer for Law Enforcement....Pages 181-194
Tracking Hidden Groups Using Communications....Pages 195-208
Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study....Pages 209-222
“Atrium” — A Knowledge Model for Modern Security Forces in the Information and Terrorism Age....Pages 223-231
Untangling Criminal Networks: A Case Study....Pages 232-248
Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework....Pages 249-265
Collaborative Workflow Management for Interagency Crime Analysis....Pages 266-280
Using Support Vector Machines for Terrorism Information Extraction....Pages 1-12
Criminal Incident Data Association Using the OLAP Technology....Pages 13-26
Names: A New Frontier in Text Mining....Pages 27-38
Web-Based Intelligence Reports System....Pages 39-58
Authorship Analysis in Cybercrime Investigation....Pages 59-73
Behavior Profiling of Email....Pages 74-90
Detecting Deception through Linguistic Analysis....Pages 91-101
A Longitudinal Analysis of Language Behavior of Deception in E-mail....Pages 102-110
Evacuation Planning: A Capacity Constrained Routing Approach....Pages 111-125
Locating Hidden Groups in Communication Networks Using Hidden Markov Models....Pages 126-137
Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department....Pages 138-152
Decision Based Spatial Analysis of Crime....Pages 153-167
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement....Pages 281-295
Active Database Systems for Monitoring and Surveillance....Pages 296-307
Integrated “Mixed” Networks Security Monitoring — A Proposed Framework....Pages 308-321
Bioterrorism Surveillance with Real-Time Data Warehousing....Pages 322-335
Privacy Sensitive Distributed Data Mining from Multi-party Data....Pages 336-342
P ro G en IE: Biographical Descriptions for Intelligence Analysis....Pages 343-345
Scalable Knowledge Extraction from Legacy Sources with SEEK....Pages 346-349
“TalkPrinting”: Improving Speaker Recognition by Modeling Stylistic Features....Pages 350-354
Emergent Semantics from Users’ Browsing Paths....Pages 355-357
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection....Pages 358-365
Training Professionals to Detect Deception....Pages 366-370
An E-mail Monitoring System for Detecting Outflow of Confidential Documents....Pages 371-374
Intelligence and Security Informatics: An Information Economics Perspective....Pages 375-378
An International Perspective on Fighting Cybercrime....Pages 379-384
Hiding Traversal of Tree Structured Data from Untrusted Data Stores....Pages 385-385
Criminal Record Matching Based on the Vector Space Model....Pages 386-386
Database Support for Exploring Criminal Networks....Pages 387-387
Hiding Data and Code Security for Application Hosting Infrastructure....Pages 388-388
Secure Information Sharing and Information Retrieval Infrastructure with GridIR....Pages 389-389
Semantic Hacking and Intelligence and Security Informatics....Pages 390-390